Monthly Archive September 2018

Is your business protected against a computer attack?

Computer attacks are the order of the day. Increasingly, business data is important in day-to-day business, and IT managers are constantly looking for ways to make information more secure. Unfortunately, however careful we may be, we can never guarantee 100 percent that companies are free to suffer a computer attack. For this reason, it is essential that companies use the most appropriate tools to avoid and minimize as much as possible the occurrence of computer attacks. In this article, we’ll give you a checklist of steps you must take to see if your business is effectively protected from a computer attack!

Read More

Automation of information security: yes or no?

Many managers feel that software is faster than people and doesn’t make mistakes. This is a very simplistic view of the machines versus people dichotomy and doesn’t take into account all the valencies of process automation for a company’s productivity. Increasingly, automation is present in everyday business, as services have become more efficient, industry has become more productive and complex tasks are accomplished in a shorter period of time. The automation of information security begins to gain prominence in companies, but there is still a lot of ignorance and a lot of distrust regarding this practice. In today’s article, let’s see if we should say “yes” or “no” to the automation of information security!

Read More

Tips for managing and analyzing a large volume of data

The key for an effective decision making is the ability to extract the most important insights from the data the company has. However, because of the high number of data that is generated every day, it is not always easy to get the best out of the information. Managers are constantly looking for new ways of managing data, so that they can keep abreast of what is going on in the business and so they can consciously decide. In today’s article, we leave you important tips for managing and analyzing a large volume of data!

Read More

Data protection in Brazil: get to know everything that will change with the new law (LGPD)

New technologies create a large number of opportunities for optimizing resources, but when misused they can compromise the security of citizens’ information. One of the biggest concerns of all companies is the protection of information. Never before had the need to protect data been so evident. Citizens must have control over their personal data and the legal framework of digital business should be simplified and clarified. This happens because, unfortunately, often the personal data of users are illegally captured, which can compromise their entire privacy. All this scenario has boosted the creation of the General Regulation on Data Protection (GDPR) for the European Union, which came into force in May this year, and now Brazil is preparing to receive a new law very similar to the one that already exists in Europe. After more than 8 years of debates in civil society, here comes Law No. 13,709/2018, the Brazilian data protection law. The legislation (LGPD) was sanctioned on August 14 and is expected to come into force in February of 2020. In this article, we highlight the main aspects of this new legislation!

Read More

What does my data masking solution need to have?

Data are the most important assets of companies today because it is through them that managers extract information about customers and the market in order to make the best decisions. Never before has there been an awareness that it is necessary and fundamental to protect information. Data masking is a technique that many companies are already using because it allows unauthorized data to remain secure and confidential. This tool is a growing need especially in the companies that generate a great volume of data (Big Data). Nowadays it is very important that companies protect their data in all stages of work, since the data is generated until the moment it is released. Data masking solutions allow data to be protected as long as they are being worked on in test environments until they are stored. Data masking creates a structurally identical version of the database, but it is exchanged for realistic but fictitious data. This makes the data protected and kept confidential. In today’s article, we’ll cover all the features that a data masking solution needs to have!

Read More