by John Ahlberg | Security
In my last post, I covered the important topic of Data Access — determining who, why, and when of using data sources. In this blog post, I delve into its sibling and prerequisite, Data Classification, which designates the “what” of data, and explore best practices I...
by John Ahlberg | Featured, Security
I am pleased to announce that Waident successfully completed its SOC 2® (System and Organization Control 2) examination and received a report dated May 31, 2023. SOC 2 is an important framework for assessing and reporting on the security, availability, processing...
by John Ahlberg | Security
Information powers your organization. It identifies trends, helps you serve customers, enables smarter decisions, fulfills compliance obligations, and fuels innovation. It can also put your company at risk. Waident held a cybersecurity event several years ago. The...
by John Ahlberg | Security
Attacks on critical suppliers in the gas and food industries have illustrated how hackers attack easy targets, inflict serious pain, and extract easy money from pressured executives. Using what we’ve learned from recent attacks here are 10 steps manufacturers...
by John Ahlberg | Featured, Security, Services
Most of us would probably agree that the cloud has turned out to be a boon for business computing. But, have we grown too confident in “the cloud” and now putting too much faith in the cloud systems we are using? Do you assume that your data is secure and that data...
by John Ahlberg | Security
Pursuing sustainability is a noble goal and more and more environmentally conscious businesses are rising to the challenge. A common example is upgrading and then reselling old technology like routers, firewalls, and switches to others who extract more life out of...