cloud security shared responsibility
Articles

You are Responsible for Data Security in the Cloud

Thomas Gloerfeld

Cloud computing is the fuel powering modern digital transformation. Across the globe, organizations invested heavily during the pandemic to adapt to new market conditions, drive more efficient business processes and support mass home working. It’s estimated that 60% of corporate data globally is now stored in the cloud, and much of this will be in public cloud data centres.

data organization
Articles

Data is the Lifeblood of your Organization

Thomas Gloerfeld

Data is pretty crucial to any business these days. Many people claim that data is the most important asset you can possess, with more utility than capital assets and more meaningful (though often latent) insights than a host of human capital. Data reflects your entire business: your intellectual property, your industry, the broader market trends, the pain points and needs of prospective customers, and your existing customer base.

blog header many roads to data protection
Articles

The Many Roads to Data Protection

Thomas Gloerfeld

Getting from point A to point B in a car always seems to be a pretty easy proposition, at least until you’re behind the wheel and moving. On a map, look for the largest road(s) with the greatest bandwidth capacity, which in the US usually means a highway or interstate, and just take that route. If one road meeting this criteria doesn’t exist, then cobble together a series of them following this general pattern (biggest roads with the most capacity), and you’re still good, right?

Articles

Security Spotlight

comforte

Holistic security means more than just implementing one tool, one method, one solution, or one process to protect your business’s data. It means exploring every avenue to implement a multi-pronged defensive strategy and never depending on just a single security tool or solution. Organizations that follow more holistic approaches to security are the ones best positioned to remain in compliance with internal and regulatory mandates and to prevent breaches or unauthorized access to sensitive data. They’re the ones who can best protect their intellectual property, their brand reputation, and their customers’ most sensitive data.