best practices for data security

Data Security Best Practices: One Doc From Destruction

By | Business, IT and Engineering | No Comments
As an organization grows, data security becomes more of a pain point. A software company may have started out with only a handful of employees who share responsibilities – and admin access – to databases and applications. But as it grows, there quickly becomes a need for things like role-based security models, backup and restore protocols and user credential policies. Read More

data security breaches and trends

Data Security Breaches in 2019 and Trends for 2020

By | Technology

With Big Data comes Big Responsibility.

When you walk into a bank, where do you think they keep the money? A bank vault, right? Well, you assume there is a bank vault even though you usually can’t see it. But you trust the institution to take the necessary precautions when it comes to the security of something as valuable as money.

But for the past decade, there’s been a significant rise in a new valuable commodity…

Read More

blue swirls and data indicating an abstract computer security layer

Abstract Security, Concrete Safety

By | IT and Engineering
Security within an embedded software scenario is a lot like an arranged marriage; neither party really knows much about the other and there’s no guarantee they’re compatible.  If the foundation is good, it can work for the long-term. Or if the parties haven’t thought about the future, it can be the start of a lifetime of trouble. Read More

Using Parameters for Enhanced Usability, Not Questionable Security

By | For Developers, Tips

Traditional Environments: DBAs Rule and Users Drool

If you want data or an update, the only option is to put in a request to your DBA.  Worse yet, it may be a committee of DBAs. The DBA would run the report and send it to you. If your company is a bit more enlightened, you may have online reports you can access (but not modify.)  While this is progress, knowledge workers really need access to data immediately and through a self-service interface that makes it easy to run routine reports with minimal steps and customize them when necessary. Read More