Sensitive Data Map

The Sensitive Data Map is the result of the search for sensitive information that we have covered in the last posts. It offers a model of the candidate fields for dissociation and an essential aid for the subsequent configuration. Also, the Sensitive Data Map presents relevant information about the content of the databases. This post … Read more

Reinforced door, the keys at building desk

For some years now, armored doors are common in the access to houses. It can be said that it is a reasonable security measure, in terms of efficiency (security results obtained against cost). I do remember that for a long time these new doors coexisted with the old practice of leaving a copy of the … Read more