by John Ahlberg | Security
If you are not using a firewall, it is time to change your approach. Often, business owners think their business is too small to be of interest to cybercriminals. Trust me when I say, hackers are interested in any easy target. No one is safe. According to the National...
by John Ahlberg | Security, Strategy
You have a key client presentation tomorrow. You’re about to launch a new product. You have a big deal pending. What happens if you have a disaster and your key systems go down? Do you have days or weeks to recover? Probably not. So you back up your data, right?...
by John Ahlberg | AI, Security
Artificial Intelligence (AI) is everywhere these days. A constant stream of new stories and technology platforms all tout the benefits of AI and how it will change our lives or stories about how AI is bad and will destroy our lives. Extremes at both ends and limited...
by John Ahlberg | Security
Waident’s cybersecurity philosophy is simple: Hackers hack easy targets, so the more layers of security an organization puts in place the harder the effort to penetrate and the less attractive a target it becomes. Encryption is one of those important layers. It is a...
by John Ahlberg | Security
In my last post, I covered the important topic of Data Access — determining who, why, and when to use data sources. In this blog post, I dig into Data Classification, which designates the “what” of data, and explore best practices I recommend to our clients. What is...
by John Ahlberg | Featured, Security
I am pleased to announce that Waident successfully completed its SOC 2® (System and Organization Control 2) examination and received a report dated May 31, 2023. SOC 2 is an important framework for assessing and reporting on the security, availability, processing...