by John Ahlberg | Security
In my last post, I covered the important topic of Data Access — determining who, why, and when to use data sources. In this blog post, I dig into Data Classification, which designates the “what” of data, and explore best practices I recommend to our clients. What is...
by John Ahlberg | Technology of the Month
Hey there, tech enthusiasts, get ready to be impressed by Curious Tech! Summer is still here, you can use a few of those items. Anti-flies fan BBQ season is still here! Annoyed by flies checking...
by John Ahlberg | Featured, Security
I am pleased to announce that Waident successfully completed its SOC 2® (System and Organization Control 2) examination and received a report dated May 31, 2023. SOC 2 is an important framework for assessing and reporting on the security, availability, processing...
by John Ahlberg | Security
Information powers your organization. It identifies trends, helps you serve customers, enables smarter decisions, fulfills compliance obligations, and fuels innovation. It can also put your company at risk. Waident held a cybersecurity event several years ago. The...
by John Ahlberg | Security
Attacks on critical suppliers in the gas and food industries have illustrated how hackers attack easy targets, inflict serious pain, and extract easy money from pressured executives. Using what we’ve learned from recent attacks here are 10 steps manufacturers...