Shadow IT
Using software for work that the company hasn't approved. This can create big security holes we want to avoid.
Using software for work that the company hasn't approved. This can create big security holes we want to avoid.
Shutting off a departing person's access to all systems immediately. It's a critical step to keep our data safe.
A tool for managing content that can be sent to any device via an API. It lets marketing update the site without needing a developer every time.
An international set of rules for managing data security. Following this helps us stay safe from hackers and data leaks.