Blog Listing

Complying with Privileged User Regulations: How One Firm Met GDPR, ISO 27001 in Salesforce
Find out how, like United Capital, you can protect data from privileged user abuse or misuse and comply with privileged user regulations.
Why Your Security Is Only as Good as Your Data Quality
Protecting EHR data from external threats is essential. But maintaining proper identity management practices and data quality is of equal importance. Learn why data quality matters.
Why Financial Services Companies Are Monitoring for Changes to Salesforce Permission Sets, Profiles
Salesforce’s flexible, layered data sharing model means you can dictate which data, objects, and fields users see, through Salesforce permission sets and profiles. Some companies take a blanket...
Who, What, When, Where: The Power of the Audit Trail in Data Security
We know very well that data security is critical and that sensitive information can be highly destructive and costly to an organization when it falls into the wrong hands. This rings especially...
What to Monitor in the Cloud: 2018 Cloud Visibility Report Reveals Blueprint to Success
Cloud spending is forecasted to reach $160 billion in 2018 – a 23.2 percent increase over 2017. Businesses around the globe are capturing the benefits of cloud technology to meet consumer demand...
What is the GDPR and How Can You Prepare?
In the past century, we have witnessed globalization interconnect the trade of goods and services around the world. But as we have evolved into a digital society, interconnectivity has become far...
What Is an Audit Trail, and Why Is It Important?
What is an audit trail? Audit trails are electronic captures of user activity in data management systems. How do they relate to data security?
Weekly Cloud Security Roundup: The Nordstrom Insider Threat, Jail Time for the C-Suite, and More
Each week, we'll bring you seven of the most compelling cloud- and Salesforce-security-related stories from the last seven days. This week, we have the Nordstrom insider threat, a new bill that...
Weekly Cloud Security Roundup: Starwood Data Breach Lawsuits Begin, Cybersecurity Predictions, and More
Each week, we’ll bring you seven of the most compelling cloud- and Salesforce-security-related stories from the last seven days. This week, we have updates on the Starwood data breach, 2019...
Weekly Cloud Security Roundup: Bank Data Security Weakened by Insiders, New Privacy Developments, and More
Each week, we’ll bring you seven of the most compelling cloud- and Salesforce-security-related stories from the last seven days. This week, we have updates on one of the biggest threats to bank...
Verizon Protected Health Information Data Breach Report 2018 Breakdown
Healthcare faces an advanced set of challenges to secure data compared to other industries. There’s no single contributing factor, but rather a wide array of industry obstacles that make securing...
Using Salesforce Shield to Monitor Salesforce Adoption, ROI
Are employees utilizing Salesforce the way you intended? What can lower performers learn from top performers? Where are your time and finances best spent? Who needs training -- and who can train?...
User Behavior Analytics
How proactive is your security team about detecting, investigating, and isolating alerts? Do your current strategies alert you to information systems misuse from within your own organization?
User Activity Monitoring in Salesforce: 5 Lessons Learned for a Stronger Data Governance Program
Here are five lessons learned from user activity monitoring in Salesforce – and what to keep in mind when building a data governance program.
4 Benefits of User Activity Monitoring for Healthcare Privacy
User activity monitoring in healthcare provides many benefits. To learn more about the top 4 benefits for privacy, read this post.
Unlock the Potential of Salesforce: Expand Trust, Privacy, and Cloud Application Security
Discover how to unlock the full potential of Salesforce to help you expand trust, privacy, and cloud application security at your organization.
Top 6 Security Takeaways from HIMSS 2018
Amid the Las Vegas lights, the Sands Expo was abuzz during the Healthcare Information and Management Systems Society (HIMSS) which gathered over 45,000 attendees to discuss the latest Innovations...
Top 5 Cyber Security and Privacy Tips for Managing Healthcare Investigations
The Office for Civil Rights (OCR) and the Department of Health and Human Services (HHS) are educating healthcare organizations on the importance of detecting and responding to data breaches, while...
Top 10 Health Technology Hazards for 2018: Ransomware and other Cybersecurity Threats Top the List
The ECRI Institute released it’s 2018 report of the Top 10 Health Technology Hazards of the year. Each year, the list is chosen regarding which hazards should receive the utmost priority in the...
The Top 13 Signs Your Employee Is About to Quit
Departing employees can create a lot of challenges for an organization. So what are the signs your employee is about to quit?