Resources

Läs vår blogg, senaste nyheter och ta del av guider och mallar. Bli inspirerad och öka din kunskap!

Blog

Technology solutions to comply with GDPR

GDPR has been in the spotlight for the past couple of years, and organizations have been working hard to follow the requirements.
Blog

6 Questions and Answers about GDPR

As the implementation of GDPR in law is approaching, we sat down with our GDPR and Security Specialist, to get his thoughts on the regulation!
Blog

Identifying and securing sensitive data

Data is important for every organization, it is critical, sensitive, informative, multidimensional, and it benefits all levels
Blog

GDPR and the meaning of Consent

Many controllers tend to use consent when it isn’t really needed, as a sort of safe haven when they are not really sure what to do.
Blog

10 questions to ask when deciding on a cloud hosting provider

Moving your business operations to the cloud can cut costs, streamline workflow and eliminate the need for in-house hardware.
Success Stories

TicTac Mobile

As a successful, growing, family business, the team at TicTac realized they needed to find a partner that could do more than just provide servers.
Blog

HSM – What is it and who needs one?

An HSM is said to provide the highest security possible, so what is a Hardware Security Module, what does it do and how is it used?
Blog

Can tokenization reduce PCI DSS audit scope?

Tokenization replaces cardholder data with an “alias”, a separate random-generated value called a token. Learn more on the blog