Security Blog

2018 – The Year with GDPR and CLOUD Act

2018 was really the year of data privacy and protection. I mean who didn’t get about 10 000 GDPR emails? We saw companies all over Europe and the world scramble to meet the requirements of the data protection regulation. The year has really highlighted the importance of security and integrity. In this blog post we will go through some of...

Read full article
Ghostwriter

How to improve protection against cyber attacks

What steps can companies take to improve their protection against cyber attacks? Before you even begin to think about the security solutions you need, you should evaluate and define what IT security really means to your organization, and what you expect to get from the solutions. Do you have sensitive information that you need to protect? Is high availability your...

Read full article
Ghostwriter

What kinds of companies can benefit from using a WAF?

In the world of IT, there is a continuous game of cat and mouse between cyber criminals and companies. In the IT industry we have to stay one step ahead of the hackers, at all times. Firewalls have improved security on the Internet in a big way. However, there are still many cyber security threats out there, and we have...

Read full article
Ghostwriter

Guide to password security – how to protect your employees

According to the National Cyber Security Center in the UK, British people have an average of 22 passwords. If you take that number as an indication for the rest of Europe and the world, that’s a lot of passwords! A password is probably the most common security measure used to protect information. Therefore, it is important that they are safe....

Read full article
Ghostwriter

Why you should care about application security

Applications play an important role in our lives. Applications facilitate communication and help us in various different ways. At work, in our day-to-day lives, in how we communicate and how we access information. Despite this, applications can also pose a security threat. Poorly coded applications with inadequate security can result in attacks, and worst-case scenario - data breaches. Web application attacks...

Read full article
Ghostwriter

1 month with GDPR – Frequently asked questions

It has now been a little more than a month since GDPR was applied in law. It is now, after the implementation of the GDPR, when things become interesting! What organizations will the Supervisory authorities in Europe investigate first? How well prepared are companies for GDPR? In my work as Compliance Manager and GDPR Consultant, I receive daily questions about...

Read full article
Jonas Gharanfoli

CLOUD Act – How the new American law can impact European companies

In the shadow of GDPR, US authorities have introduced CLOUD Act, a US federal law that has met quite a lot of criticism. CLOUD Act, among other things, enables U.S. authorities get access to data of US cloud providers - including data stored abroad. Many have expressed concern about what the law may entail in practice. What is CLOUD Act?...

Read full article
Ghostwriter

10 essential questions when deciding on a cloud or hosting provider

Moving your business operations to the cloud or to a hosting provider can cut costs, streamline your workflow and eliminate the need for in-house IT personnel and hardware. But perhaps the biggest benefit for companies is the ability to concentrate on the business at hand and let someone else handle worrisome IT concerns like security, maintenance, backup and support. The...

Read full article
Magnus Mårtensson

Technology solutions to comply with GDPR

GDPR has been in the spotlight the past year, and organizations have been working hard to follow the requirements. Documentation has been an important part of the adaptation work, something we have previously written about here. But GDPR is about more than just documentation. In order to comply with GDPR, companies not only need legal competence, but also technical expertise....

Read full article
Ghostwriter

Questions and answers about WAF

WAF is short for Web Application Firewall, and is a firewall for web applications. It is a way to protect network traffic on an application level. How does a Web Application Firewall work? A WAF examines and filters traffic to web applications. It keeps track of communication between the client and server, and server and server when building advanced web...

Read full article
Ghostwriter
  • 24 Solutions AB
  • Smedjegatan 2C
  • SE-13154 Nacka, Sweden
  • +46 (0)8 535 24 100
  • info@24solutions.com