Blog | Cryptzone Insight

New CFO Andy Jones Joins Cryptzone to Manage Rapid Growth

Posted on Oct 22, 2014

Following quickly on the heels of the Cryptzone acquisition of HiSoftware, today I’m excited to announce Andy Jones has joined the company as chief financial officer. Jones is a skilled finance leader with over 25 years of experience, more than 12 of which include working with venture capital and private equity-backed companies. Prior to joining [...]

Read More

Are you next? Avoid becoming the next PoS breach target

Posted on Oct 21, 2014

Target, Sally Beauty, Neiman Marcus, Michaels, Albertsons, Home Depot… What do these half-dozen household brands have in common? The answer, of course, is that over the past 12 months they've all suffered data breaches that exposed their customers' payment card data. Considering these are some of the US's biggest retailers, it's an alarming statistic. What's [...]

Read More

SharePoint Plus: Process-driven governance and control

Posted on Oct 16, 2014

Governance is the key to a successful SharePoint project. It helps us ensure that users understand their responsibilities, that work can proceed without creeping threats to efficiency like unclassified files and orphan sites, and that an organization fulfils its regulatory requirements. When SharePoint is used to store and process documents that require high levels of [...]

Read More

SharePoint Plus: The revision of the security framework

Posted on Oct 10, 2014

When organizations develop SharePoint governance plans, and specifically security policies, they often focus on what SharePoint and Windows can do, and how that functionality can be leveraged to the best effect. This means that whatever they need to achieve in terms of compliance, auditing and information security, it comes down to out-of-the-box SharePoint and Active [...]

Read More

Who are you? Flaws in traditional identity and access management

Posted on Oct 7, 2014

When Target revealed it had suffered a massive data breach the world reeled. Many retailers scrambled to make sure they were secure and yet, it has happened again and again since then. So, what went wrong? Identity access management is fundamentally flawed It's more or less universally accepted in IT security that upfront proof of [...]

Read More