The search found 3761 results.
Blog
Each week, we’ll bring you seven of the most compelling cloud- and Salesforce-security-related stories from the last seven days. This week, we have updates on the Starwood data breach, 2019...
Blog
Each week, we'll bring you seven of the most compelling cloud- and Salesforce-security-related stories from the last seven days. This week, we have the Nordstrom insider threat, a new bill that...
Blog
What is an audit trail? Audit trails are electronic captures of user activity in data management systems. How do they relate to data security?
Blog
In June 2017, the world’s #1 CRM platform, Salesforce, released their newly rebranded analytics tools for viewing data – Einstein Analytics (formerly known as “Wave”). Many who use the platform...
Blog
In the past century, we have witnessed globalization interconnect the trade of goods and services around the world. But as we have evolved into a digital society, interconnectivity has become far...
Blog
Cloud spending is forecasted to reach $160 billion in 2018 – a 23.2 percent increase over 2017. Businesses around the globe are capturing the benefits of cloud technology to meet consumer demand...
Blog
On April 7- 10, 2019, the Health Care Compliance Association (HCCA) is hosting its Compliance Institute in Boston. With over 100 sessions, networking opportunities, and an exhibit hall full of...
Blog
We know very well that data security is critical and that sensitive information can be highly destructive and costly to an organization when it falls into the wrong hands. This rings especially...
Blog
Salesforce’s flexible, layered data sharing model means you can dictate which data, objects, and fields users see, through Salesforce permission sets and profiles. Some companies take a blanket...
Blog
Protecting EHR data from external threats is essential. But maintaining proper identity management practices and data quality is of equal importance. Learn why data quality matters.