Resources
The latest news and tips from Complior!
Boost your knowledge on compliance and cyber security.

Are you protecting your client data securely enough?
If you’re a small to medium sized business do you have to meet as many requirements and jump through as many hoops as a large enterprise?

COMPLIOR: Products and Services
The European Commission takes personal data of its citizens very seriously and penalizes organizations that are not up to date..

PCI DSS Cloud Hosting
Outsourcing operations to a third party means that you share responsibility for reaching the requirements in PCI DSS. Read the our blog now.

Should you outsource?
You collect payment from your customers online and you know it’s your company’s responsibility to keep that information secure

Pedo mellon a minno, speak friend and enter
How to create strong passwords and why that is so important! Much more on the blog, including if Moria’s door was well protected

Checklist: 7 Questions to ask potential hosting providers
When selecting a reliable, trusted PCI DSS cloud-hosting provider it is critical to understand and investigate the seven main areas outlined below so you can partner with confidence.

What kinds of companies can benefit from using a WAF?
In the world of IT, there is a continuous game of cat and mouse between cyber criminals and companies. This is where a WAF comes in…

5 tips for writing an Information Security Policy
5 tips for writing an Information Security Policy: It can be time consuming to create a policy. And there are a few things to keep in mind