5 Ways To Implement Compliant GDPR Encryption Processes

by Hannah Grace Holladay / October 4, 2023

 The General Data Protection Regulation (GDPR) imposes security and privacy regulations that apply to businesses that store or process European Union residents’ personal data. It enacts a broad range of measures to give data subjects control over their data and protect them from unauthorized exposure.  Encryption is a vital aspect of obtaining GDPR compliance. Encryption protects your organization so that in the event that data is lost, stolen, or compromised,…

Cloud Compliance and Security: The Truth Behind 5 Cloud Computing Myths

by Hannah Grace Holladay / February 15, 2023

Cloud computing myths have occupied the IT world since the cloud became a viable infrastructure hosting option a decade and a half ago. Those of us who worked in IT at the time remember the many misconceptions about what the cloud was and whether it was possible to host business-critical services in the cloud while maintaining security and regulatory compliance.  The IT industry and the cloud have evolved beyond all…

What is a Cloud Access Security Broker (CASB)?

by Hannah Grace Holladay / July 12, 2023

A cloud access security broker (CASB) is a software security service that acts as an intermediary between business cloud users and cloud providers. CASBs monitor data flow to and from cloud platforms, ensuring that cloud use comply with information security policies and regulations.  Much as a firewall enables businesses to enforce security policies for incoming and outgoing network traffic, a CASB enables them to enforce infrastructure and information security policies…

DDoS Protection: How to Survive a Distributed Denial of Service Attack

by Hannah Grace Holladay / June 14, 2023

You’re sitting at your desk when the first notification arrives. Uptime monitoring has detected unusually long response times for the servers hosting the business’s primary web app. Soon after, your manager calls to say customer support is getting complaints—many users can’t sign in and the app is slow for those who can.  You try to open the app to see for yourself, but the browser times out.  With increasing concern,…

How to Create a Positive Information Security Culture for Your Workplace

by Hannah Grace Holladay / June 15, 2023

What are the most significant security risks facing your organization? Your answer might include common external threats, such as brute force attacks, phishing attacks, ransomware, supply chain attacks, and attacks against vulnerable software, among many others. But the focus on external security risks misses an important point: External attacks often exploit vulnerabilities created by poor internal security controls and practices.   According to the 2021 Verizon Data Breach Incident Report, 85%…