Security Blog

How to determine and reduce PCI DSS scope

The journey towards PCI compliance is not always straightforward. The PCI compliance process is oftentimes very costly and requires a lot of resources. A lot of organizations also struggle to understand what systems need to be protected and have to fulfill the requirements in PCI DSS. Defining scope is a critical process in PCI DSS. So how do you define...

Read full article
Ghostwriter

What is PCI DSS and why is compliance important?

In an age where we in a lot of countries can declare that cash is no longer king, ensuring the secure handling of cardholder data has become increasingly important. A critical part in this has been the establishment of PCI DSS. So, what is PCI DSS and how does the security standard protect card payments? Find out below. What is...

Read full article
Ghostwriter

2018 – The Year with GDPR and CLOUD Act

2018 was really the year of data privacy and protection. I mean who didn’t get about 10 000 GDPR emails? We saw companies all over Europe and the world scramble to meet the requirements of the data protection regulation. The year has really highlighted the importance of security and integrity. In this blog post we will go through some of...

Read full article
Ghostwriter

How to improve protection against cyber attacks

What steps can companies take to improve their protection against cyber attacks? Before you even begin to think about the security solutions you need, you should evaluate and define what IT security really means to your organization, and what you expect to get from the solutions. Do you have sensitive information that you need to protect? Is high availability your...

Read full article
Ghostwriter

What kinds of companies can benefit from using a WAF?

In the world of IT, there is a continuous game of cat and mouse between cyber criminals and companies. In the IT industry we have to stay one step ahead of the hackers, at all times. Firewalls have improved security on the Internet in a big way. However, there are still many cyber security threats out there, and we have...

Read full article
Ghostwriter

Guide to password security – how to protect your employees

According to the National Cyber Security Center in the UK, British people have an average of 22 passwords. If you take that number as an indication for the rest of Europe and the world, that’s a lot of passwords! A password is probably the most common security measure used to protect information. Therefore, it is important that they are safe....

Read full article
Ghostwriter

Why you should care about application security

Applications play an important role in our lives. Applications facilitate communication and help us in various different ways. At work, in our day-to-day lives, in how we communicate and how we access information. Despite this, applications can also pose a security threat. Poorly coded applications with inadequate security can result in attacks, and worst-case scenario - data breaches. Web application attacks...

Read full article
Ghostwriter

1 month with GDPR – Frequently asked questions

It has now been a little more than a month since GDPR was applied in law. It is now, after the implementation of the GDPR, when things become interesting! What organizations will the Supervisory authorities in Europe investigate first? How well prepared are companies for GDPR? In my work as Compliance Manager and GDPR Consultant, I receive daily questions about...

Read full article
Jonas Gharanfoli

CLOUD Act – How the new American law can impact European companies

In the shadow of GDPR, US authorities have introduced CLOUD Act, a US federal law that has met quite a lot of criticism. CLOUD Act, among other things, enables U.S. authorities get access to data of US cloud providers - including data stored abroad. Many have expressed concern about what the law may entail in practice. What is CLOUD Act?...

Read full article
Ghostwriter

10 essential questions when deciding on a cloud or hosting provider

Moving your business operations to the cloud or to a hosting provider can cut costs, streamline your workflow and eliminate the need for in-house IT personnel and hardware. But perhaps the biggest benefit for companies is the ability to concentrate on the business at hand and let someone else handle worrisome IT concerns like security, maintenance, backup and support. The...

Read full article
Magnus Mårtensson
  • 24 Solutions AB
  • Smedjegatan 2C
  • SE-13154 Nacka, Sweden
  • +46 (0)8 535 24 100
  • info@24solutions.com