BLOG
Data Encryption: Best Practices for Business Owners
Waident’s cybersecurity philosophy is simple: Hackers hack easy targets, so the more layers of security an organization puts in place the harder the effort to penetrate and the less attractive a target it becomes. Encryption is one of those important layers. It is a...
Waident Recognized on the INC. 5000™ List of Fastest Growing Companies
We are announcing a major milestone in our journey – being recognized as the #3076 company on the prestigious INC. 5000™ list. This achievement is a testament to the dedication and hard work of our incredible team and our valued customers' unwavering support. As we...
The Importance of Data Classification in Your Cybersecurity
In my last post, I covered the important topic of Data Access — determining who, why, and when to use data sources. In this blog post, I dig into Data Classification, which designates the “what” of data, and explore best practices I recommend to our clients. What is...
Curious Tech – August
Hey there, tech enthusiasts, get ready to be impressed by Curious Tech! Summer is still here, you can use a few of those items. Anti-flies fan BBQ season is still here! Annoyed by flies checking...
Waident Successfully Completes AICPA SOC 2 Examination
I am pleased to announce that Waident successfully completed its SOC 2® (System and Organization Control 2) examination and received a report dated May 31, 2023. SOC 2 is an important framework for assessing and reporting on the security, availability, processing...
Best Practices for Managing Data Access
Information powers your organization. It identifies trends, helps you serve customers, enables smarter decisions, fulfills compliance obligations, and fuels innovation. It can also put your company at risk. Waident held a cybersecurity event several years ago. The...
Oh, Sh*t! You Seriously Mean to Tell Me That I Could Lose All of My Cloud Data?
Most of us would probably agree that the cloud has turned out to be a boon for business computing. But, have we grown too confident in “the cloud” and now putting too much faith in the cloud systems we are using? Do you assume that your data is secure and that data...
The Pitfalls of Unwisely Retiring Old Office Technology
Pursuing sustainability is a noble goal and more and more environmentally conscious businesses are rising to the challenge. A common example is upgrading and then reselling old technology like routers, firewalls, and switches to others who extract more life out of...
Curious Tech – May
And it’s already May! Some ideas on how to impress your friends and family. Here is my May curious tech list: Giant Spider Pillow It is kind of creepy having a huge fuzzy spider pillow, but it is kind of cool....
Charging your phone in a public place? Beware!
FBI recommends avoiding free charging stations in airports, hotels, or shopping centers, as it may put your security at risk. Recently on Twitter, the FBI cautioned that, “Bad actors have figured out ways to use public USB ports to introduce malware and monitoring...
Curious Tech – April 2023
Here are my favorite items from the recent Consumer Electronic Show (CES), where tech giants and innovators introduce new technology: Peddle-powered bike desk You gotta peddle to charge the battery or no power for your laptop...
IT Support is NOT IT Security
I hear all too often from business leaders who think their IT Support team and their Security team are synonymous. They just assume that Support addresses all of their security needs by default. After all, the IT Support gang has been managing the anti-virus software...
Subscribe
Get our latest tools and thinking.