WhatsApp, the popular messaging app, has been in the news lately for all the wrong reasons. First, it was revealed that the app was sharing user data with Facebook – even if users had opted out of sharing their data with the social media giant. Then, it was revealed that the app was sharing user […]
Calculating the cost of downtime
Average stay value According to a 2014 Gartner study, the average cost per minute of stay is USD 5,600. However, the research company is quick to point out that this is only an average. An Avaya report from the same year found that average costs range from $2,300 to $9,000 per minute, depending on factors such as company size and vertical […]
How the CISO role is evolving
Definition of a CISO The Chief Information Security Officer (CISO) is the executive responsible for the information and data security of an organisation. In the past, the position was defined rather narrowly, but today it is often used in the same sense as CSO or VP of Security, denoting a broader role within the organisation. The Chief […]
4 Things You Need to Know About SOC 2 Compliance
Compliance with SOC 2 requirements demonstrates that the organisation maintains a high level of information security. Stringent compliance requirements (verified by on-site audits) help to ensure the responsible handling of sensitive information. Compliance with SOC 2 requirements can be ensured. Improved information security SOC2 guidelines help organisations protect themselves against cyber-attacks and prevent vulnerabilities. Competitive advantage This is because customers prefer to deal with service […]
Data Auditing
Data validation is an assessment of the quality of data throughout its lifecycle to ensure that it is accurate and valid for a particular application. It measures the performance of the data and identifies problems that need to be resolved. Data auditing leads to better data quality and allows you to use better analytics to improve business […]
What is SecOps? Everything you need to know
SecOps are a combination of security and IT operations personnel, highly specialised teams focused on monitoring and assessing risk and protecting company assets, often operating within a Security Operations Centre (SOC). Cyber security attacks are on the rise, and the new challenges of handling large numbers of employees in remote locations during and after a pandemic make […]