by John Ahlberg | Security, Strategy
You have a key client presentation tomorrow. You’re about to launch a new product. You have a big deal pending. What happens if you have a disaster and your key systems go down? Do you have days or weeks to recover? Probably not. So you back up your data, right?...
by John Ahlberg | AI, Security
Artificial Intelligence (AI) is everywhere these days. A constant stream of new stories and technology platforms all tout the benefits of AI and how it will change our lives or stories about how AI is bad and will destroy our lives. Extremes at both ends and limited...
by John Ahlberg | Security
Waident’s cybersecurity philosophy is simple: Hackers hack easy targets, so the more layers of security an organization puts in place the harder the effort to penetrate and the less attractive a target it becomes. Encryption is one of those important layers. It is a...
by John Ahlberg | Security
In my last post, I covered the important topic of Data Access — determining who, why, and when of using data sources. In this blog post, I delve into its sibling and prerequisite, Data Classification, which designates the “what” of data, and explore best practices I...
by John Ahlberg | Featured, Security
I am pleased to announce that Waident successfully completed its SOC 2® (System and Organization Control 2) examination and received a report dated May 31, 2023. SOC 2 is an important framework for assessing and reporting on the security, availability, processing...
by John Ahlberg | Security
Information powers your organization. It identifies trends, helps you serve customers, enables smarter decisions, fulfills compliance obligations, and fuels innovation. It can also put your company at risk. Waident held a cybersecurity event several years ago. The...