BLOG
The Importance of Data Classification in Your Cybersecurity
In my last post, I covered the important topic of Data Access — determining who, why, and when of using data sources. In this blog post, I delve into its sibling and prerequisite, Data Classification, which designates the “what” of data, and explore best practices I...
Curious Tech – August
Hey there, tech enthusiasts, get ready to be impressed by Curious Tech! Summer is still here, you can use a few of those items. Anti-flies fan BBQ season is still here! Annoyed by flies checking...
Waident Successfully Completes AICPA SOC 2 Examination
I am pleased to announce that Waident successfully completed its SOC 2® (System and Organization Control 2) examination and received a report dated May 31, 2023. SOC 2 is an important framework for assessing and reporting on the security, availability, processing...
Best Practices for Managing Data Access
Information powers your organization. It identifies trends, helps you serve customers, enables smarter decisions, fulfills compliance obligations, and fuels innovation. It can also put your company at risk. Waident held a cybersecurity event several years ago. The...
9 Steps Manufacturers Can Take to Prevent a Ransomware Attack
Attacks on critical suppliers in the gas and food industries have illustrated how hackers attack easy targets, inflict serious pain, and extract easy money from pressured executives. Using what we've learned from recent attacks here are 10 steps manufacturers can take...
Oh, Sh*t! You Seriously Mean to Tell Me That I Could Lose All of My Cloud Data?
Most of us would probably agree that the cloud has turned out to be a boon for business computing. But, have we grown too confident in “the cloud” and now putting too much faith in the cloud systems we are using? Do you assume that your data is secure and that data...
The Pitfalls of Unwisely Retiring Old Office Technology
Pursuing sustainability is a noble goal and more and more environmentally conscious businesses are rising to the challenge. A common example is upgrading and then reselling old technology like routers, firewalls, and switches to others who extract more life out of...
Curious Tech – May
And it’s already May! Some ideas on how to impress your friends and family. Here is my May curious tech list: Giant Spider Pillow It is kind of creepy having a huge fuzzy spider pillow, but it is kind of cool....
Charging your phone in a public place? Beware!
FBI recommends avoiding free charging stations in airports, hotels, or shopping centers, as it may put your security at risk. Recently on Twitter, the FBI cautioned that, “Bad actors have figured out ways to use public USB ports to introduce malware and monitoring...
Curious Tech – April 2023
Here are my favorite items from the recent Consumer Electronic Show (CES), where tech giants and innovators introduce new technology: Peddle-powered bike desk You gotta peddle to charge the battery or no power for your laptop...
IT Support is NOT IT Security
I hear all too often from business leaders who think their IT Support team and their Security team are synonymous. They just assume that Support addresses all of their security needs by default. After all, the IT Support gang has been managing the anti-virus software...
Your Phishing Guide: How to protect your business
One of the most common ways to breach business systems is phishing. All it takes is one employee, one email, one click and your business is at risk and your data vulnerable. Email phishing is a type of cyber-attack that has been around for many years and continues to...
Subscribe
Get our latest tools and thinking.