Skip to main content

10 posts tagged with "compliance"

View All Tags

· 3 min read
Alexander Eklöf

The concept of a Minimum Viable Secure Product (MVSP) is becoming increasingly relevant. With data breaches and cyber threats on the rise, it's paramount for startups to embed security into the very foundation of their products. In this blog post, we'll explore what MVSP entails and why it's a minimum security baseline for startups aiming to make their mark securely and successfully.

· 12 min read
Predrag Tasevski

We are thrilled to announce the integration of new cybersecurity controls for Jira, aimed at elevating the security posture of your organization. In addition to the default Minimum Viable Secure Product (MVSP), we have incorporated the ISO/IEC 27001 standards for both 2013 and the latest 2022 version. Furthermore, we are aligning our controls with the upcoming EU NIS Directive, contributing to a common and converged level of security in network and information systems.

· 2 min read
Predrag Tasevski

The Capability Maturity Model (CMM) is a framework for assessing and improving an organization's process maturity. It offers companies with a set of standards and best practices to follow in order to improve their capabilities in specific areas.

· 3 min read
Predrag Tasevski

In today's digital world, startups and SMEs confront a variety of issues when it comes to securing personal and sensitive data, as well as systems from cyber attacks and regulatory noncompliance. Data protection, cybersecurity, and compliance are key ideas that startups and SMEs must understand and put into practice in order to secure their assets and maintain company continuity.

· 4 min read
Predrag Tasevski

There are many terms and roles in the world of data protection and privacy that can be confusing. The controller, processor, and data protection officer are three of the most commonly misunderstood roles. Understanding the distinctions between these roles is critical for ensuring compliance with data protection regulations and protecting your customers', clients', and employees' privacy.

· 3 min read
Predrag Tasevski

Continuous awareness training and programs are important, and sometimes mandatory, for startups, SMEs, and organizations to promote and understand the risk and potential consequences of their employees' data protection, security, and compliance actions.

· 4 min read
Predrag Tasevski

Greetings and best wishes for a secure, privacy, and compliant new year for you, your loved ones, and your business!

The European Union and the United States entered into the EU-US Privacy Shield Framework, which enables US businesses to obtain personal data from the EU in accordance with EU data protection rules. However, Schrems II, which the EU Court of Justice rejected in July 2020, is no longer in use. This makes it impossible for companies to use it to move personal data from the EU to the US.

· 4 min read
Predrag Tasevski

With so many benefits including enhanced security, on-demand scaling, cheaper operating expenses, and greater business agility, there's little question that organizations are migrating to the cloud.

For the sake of removing any ambiguity from what has turned into an acronym maze, let's focus on a few examples and definitions of services provided from the cloud through the internet.

· 3 min read
Predrag Tasevski

The majority of organizations nowadays place a strong emphasis on their brand value and reliable client relationships. Companies are forced to consider security measures and their solutions as a result, which include ISO 27001 accreditation or the SOC 2 framework. Due to these reasons, corporate behavior is affected globally.

· 5 min read
Predrag Tasevski

GDPR calls for a complete strategy for data safety, compliance, governance and risk. Although data security tools are simply one piece of the GDPR compliance ecosystem, they're still a crucial component of shielding client data privacy.