Blog
Technology solutions to comply with GDPR
GDPR has been in the spotlight for the past couple of years, and organizations have been working hard to follow the requirements.
Blog
6 Questions and Answers about GDPR
As the implementation of GDPR in law is approaching, we sat down with our GDPR and Security Specialist, to get his thoughts on the regulation!
Blog
Identifying and securing sensitive data
Data is important for every organization, it is critical, sensitive, informative, multidimensional, and it benefits all levels
Blog
GDPR and the meaning of Consent
Many controllers tend to use consent when it isn’t really needed, as a sort of safe haven when they are not really sure what to do.
Blog
10 questions to ask when deciding on a cloud hosting provider
Moving your business operations to the cloud can cut costs, streamline workflow and eliminate the need for in-house hardware.
Success Stories
TicTac Mobile
As a successful, growing, family business, the team at TicTac realized they needed to find a partner that could do more than just provide servers.
Blog
HSM – What is it and who needs one?
An HSM is said to provide the highest security possible, so what is a Hardware Security Module, what does it do and how is it used?
Blog
Can tokenization reduce PCI DSS audit scope?
Tokenization replaces cardholder data with an “alias”, a separate random-generated value called a token. Learn more on the blog