Solution Architectures for the General Data Protection Regulation (GDPR)

Following the GDPR guidelines might be much easier for modern cloud companies than traditional enterprises. While most of the cloud companies have only a few centralized sources where personally identifiable information (PII) is stored, traditional companies potentially have hundreds, if not thousands, of different databases and data sources that need to be assessed, reviewed and updated to meet the latest data privacy standards.

Spotlight

Deltec Solutions

For more than 25 years, Deltec has helped organizations take the frustration and worries out of technology. Our services include Managed IT, Consulting and Planning, Cybersecurity and Business Continuity, and – through a service line known as Deltec Digital – website design and digital marketing services. Whether you have an urgent IT problem, are planning a move to a new location, need to augment your current IT staff with outside professionals, or simply need some counsel on how to make sure you have the technology you need to help you achieve your goals, call the experienced professionals at Deltec today. Like many technology companies started during the personal computer boom, Deltec began helping customers in 1990 by building and fixing PCs for people and organizations. As the need for computer networking continued to grow, a focus on small and medium-sized business computer networks and systems quickly became Deltec’s service focus. Further growth presented opportunities to assis

OTHER WHITEPAPERS
news image

Security Pillar AWS Well-Architected Framework

whitePaper | October 18, 2022

Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon.

Read More
news image

Adobe Operational Security Overview

whitePaper | December 30, 2022

With a cloud footprint that includes public and private clouds across different providers, the Adobe® multi-cloud strategy requires consistent and repeatable guardrails that are readily available to our product and service teams. To that end, our dedicated operational security team focuses on securing cloud resources at scale and helping ensure the safety and security of customer applications and data within our continually evolving cloud infrastructure operations.

Read More
news image

Security White Paper for Synappx Applications and Services

whitePaper | September 28, 2022

Synappx application services help bring smarter office experiences. They are designed to help optimize hybrid collaboration experiences. Synappx application services are protected by a robust, layered security system to ensure the system and its components are not opening points of vulnerability for your data or networks. Through a combination of world-class technology providers including Microsoft Azure, Google Workspace and security best practices, your use of the Synappx application services helps keep your information safe and secure while helping you enhance productivity in your office.

Read More
news image

Cyber Security in the AC500 PLC family

whitePaper | February 7, 2023

ABB offers a comprehensive range of scalable PLCs and robust HMI control panels. Since its launch in 2006, the AC500 PLC platform has achieved significant industry recognition for delivering high performance, quality and reliability. Cyber Security has become of key importance for ABB customers and ABB alike. In order to help protect ABB customers as well as our brand, cyber security must be an important aspect in our products, systems, projects and service deliveries.

Read More
news image

PROMOTING BETTER CYBERSECURITY

whitePaper | December 18, 2019

The Ohio Data Protection Act (“ODPA” or the Act), came into force on November 2, 2018.1 The Act seeks to improve cybersecurity among Ohio businesses. It does so by providing an affirmative defense against tort claims arising from a data breach to businesses that can demonstrate they have implemented a qualifying cybersecurity program that reasonably conforms to one of ten specified cybersecurity frameworks and met certain other safeguards specified in the Act.

Read More
news image

The ‘Zero Trust’ Model in Cybersecurity: Towards understanding and deployment

whitePaper | August 24, 2022

In the last couple of years, “zero trust” has gained significant traction in the cybersecurity realm as a means to protect networks and increase security across organizations. In part, the growing popularity of this security model can be attributed to the shift to hybrid working practices that call for a more secure work environment whether on- or off-premises.

Read More

Spotlight

Deltec Solutions

For more than 25 years, Deltec has helped organizations take the frustration and worries out of technology. Our services include Managed IT, Consulting and Planning, Cybersecurity and Business Continuity, and – through a service line known as Deltec Digital – website design and digital marketing services. Whether you have an urgent IT problem, are planning a move to a new location, need to augment your current IT staff with outside professionals, or simply need some counsel on how to make sure you have the technology you need to help you achieve your goals, call the experienced professionals at Deltec today. Like many technology companies started during the personal computer boom, Deltec began helping customers in 1990 by building and fixing PCs for people and organizations. As the need for computer networking continued to grow, a focus on small and medium-sized business computer networks and systems quickly became Deltec’s service focus. Further growth presented opportunities to assis

Events