Resources

Läs vår blogg, senaste nyheter och ta del av guider och mallar. Bli inspirerad och öka din kunskap!

Blog

PCI DSS Cloud Hosting

Outsourcing operations to a third party means that you share responsibility for reaching the requirements in PCI DSS. Read the our blog now.
Blog

Should you outsource?

You collect payment from your customers online and you know it’s your company’s responsibility to keep that information secure
Blog

Pedo mellon a minno, speak friend and enter

How to create strong passwords and why that is so important! Much more on the blog, including if Moria’s door was well protected
Blog
Info
Knowledge Center
Templates

Checklist: 7 Questions to ask potential hosting providers

When selecting a reliable, trusted PCI DSS cloud-hosting provider it is critical to understand and investigate the seven main areas outlined below so you can partner with confidence.
Blog

Which companies can benefit from using a WAF?

In the world of IT, there is a continuous game of cat and mouse between cyber criminals and companies. This is where a WAF comes in…
Blog

5 tips for writing an Information Security Policy

5 tips for writing an Information Security Policy: It can be time consuming to create a policy. And there are a few things to keep in mind
Blog

How to implement a Log management system

Implementation of a log management system is not easy due to lack of project objectives & the preparatory activities that are its foundation
Nyheter

ARTICLE: THIS IS HOW LIFE SCIENCE COMPANIES CAN CHOOSE THE RIGHT IT OPERATION

The need for IT operations and digitization is great in the life science sector. But the regulatory requirements must be complied with.