Skip to main content

· 3 min read
Alexander Eklöf

The concept of a Minimum Viable Secure Product (MVSP) is becoming increasingly relevant. With data breaches and cyber threats on the rise, it's paramount for startups to embed security into the very foundation of their products. In this blog post, we'll explore what MVSP entails and why it's a minimum security baseline for startups aiming to make their mark securely and successfully.

· 12 min read
Predrag Tasevski

We are thrilled to announce the integration of new cybersecurity controls for Jira, aimed at elevating the security posture of your organization. In addition to the default Minimum Viable Secure Product (MVSP), we have incorporated the ISO/IEC 27001 standards for both 2013 and the latest 2022 version. Furthermore, we are aligning our controls with the upcoming EU NIS Directive, contributing to a common and converged level of security in network and information systems.

· 3 min read
Predrag Tasevski

As we celebrate Unicis's one-year anniversary, it's a good time to think about our journey and the things we've done in the field of privacy, security, and compliance. We are pleased to announce our accomplishments, ranging from our presence on the Atlassian Marketplace to our burgeoning social media following. Furthermore, we have exciting future plans, including the launch of the Unicis Platform beta and the development of additional modules and apps.

· 2 min read
Predrag Tasevski

The Capability Maturity Model (CMM) is a framework for assessing and improving an organization's process maturity. It offers companies with a set of standards and best practices to follow in order to improve their capabilities in specific areas.

· 3 min read
Predrag Tasevski

In today's digital world, startups and SMEs confront a variety of issues when it comes to securing personal and sensitive data, as well as systems from cyber attacks and regulatory noncompliance. Data protection, cybersecurity, and compliance are key ideas that startups and SMEs must understand and put into practice in order to secure their assets and maintain company continuity.

· 4 min read
Predrag Tasevski

There are many terms and roles in the world of data protection and privacy that can be confusing. The controller, processor, and data protection officer are three of the most commonly misunderstood roles. Understanding the distinctions between these roles is critical for ensuring compliance with data protection regulations and protecting your customers', clients', and employees' privacy.

· 3 min read
Predrag Tasevski

Continuous awareness training and programs are important, and sometimes mandatory, for startups, SMEs, and organizations to promote and understand the risk and potential consequences of their employees' data protection, security, and compliance actions.

· 2 min read
Predrag Tasevski

Unicis.Tech has joined a fantastic group of contributors to a Minimum Viable Secure Product (MVSP) project to assist startups and SMEs in tackling cybersecurity and privacy problems early on in order to reduce risks, assure compliance, build consumer confidence, and gain a competitive edge. For this reason we created a Unicis Cybersecurity Control app for Atlassian Jira using the Forge platform as a result.

· 4 min read
Predrag Tasevski

Greetings and best wishes for a secure, privacy, and compliant new year for you, your loved ones, and your business!

The European Union and the United States entered into the EU-US Privacy Shield Framework, which enables US businesses to obtain personal data from the EU in accordance with EU data protection rules. However, Schrems II, which the EU Court of Justice rejected in July 2020, is no longer in use. This makes it impossible for companies to use it to move personal data from the EU to the US.

· 4 min read
Predrag Tasevski

With so many benefits including enhanced security, on-demand scaling, cheaper operating expenses, and greater business agility, there's little question that organizations are migrating to the cloud.

For the sake of removing any ambiguity from what has turned into an acronym maze, let's focus on a few examples and definitions of services provided from the cloud through the internet.