Why flexibility is crucial for modern IT management

Why flexibility is crucial for modern IT management

The role of IT management isn't what it used to be. As business technology continues to evolve more rapidly by the year, the responsibilities of IT managers are constantly in motion.

One month, IT managers may find themselves setting up standardized computers and hardwares for an office, only to shift to creating work-from-home ecosystems and decentralizing their IT infrastructure the next.

Read More
Why businesses are picking up more SaaS

Why businesses are picking up more SaaS

The turn of the decade has marked another era defined by technological developments.

In 2021, Meta marked its landmark name change and functional pivot towards virtual reality, NFTs became wildly popular after seven years in relative obscurity, and monopolistic companies such as Google and Apple continued on their streaks of incredible profits and technological developments. In 2022, ubiquitously popular apps such as TIkTok have further cemented their global presence, and Uber reported their first ever positive cash flow.

Read More
Three common types of SaaS misconfiguration (and how to fix them)

Three common types of SaaS misconfiguration (and how to fix them)

Cyber security is often boiled down to a couple of cliches. Strong passwords, a sturdy firewall, and anti-virus softwares. And while all of these measures are crucial components of business security, they do not adequately represent the most prevalent threats in modern cybercrime.

In a recent survey from The Cloud Security Alliance (CSA), it was revealed that 43% of organizations had experienced one or more security incidents resulting from a SaaS misconfiguration. This refers to when a 'Software As A Service' (SAAS) has suffered a data breach on account of poorly configured security settings and/or lacking security practices.

Read More
What is Shadow IT? The underbelly of IT management

What is Shadow IT? The underbelly of IT management

When managing your business' cybersecurity, the majority of your risk reduction will come from unanimous security measures. Whether it's password policies, security awareness training or SaaS app hardening, the best way to reduce your risk is to ensure that appropriate risk-reduction processes are implemented throughout the entire organization.

Read More
Cross-SaaS contamination: How to prevent unauthorized access to your organization

Cross-SaaS contamination: How to prevent unauthorized access to your organization

Over the past five years, the average SaaS usage in global organizations has grown exponentially. Whereas it's estimated that an average 16 SaaS applications were used per organization in 2017, research dictates a whopping increase of this average to 110 SaaS applications in 2021.

While this number is subject to change according to a myriad of factors, such as industry, size-of-operations, and the number of staff in an organization, it's apparent that SaaS security is a rampantly growing concern for any modern business.

Read More
Security with benefits

Security with benefits

Need to justify the budget to monitor SaaS applications? Look no further. Introducing security with benefits. With Detexian you can save money on SaaS licencing while reducing risks to your organization.

If your team is responsible for user onboarding / offboarding and keeping track of who’s got what access to which SaaS apps in your organisation, you know it’s a pain in the ass and things get missed.

Read More
Too much work auditing your SaaS apps?

Too much work auditing your SaaS apps?

In modern workplaces, SaaS is procured and managed by business people.

While IT has visibility into core applications such as Office 365, G Suite, Slack and Zoom, they won’t know how other sensitive data bearing SaaS apps like Salesforce, JIRA, GitHub, Xero and Slack workspaces are managed by the various other business teams.

Read More
Cyber Risk Management - Trust but verify

Cyber Risk Management - Trust but verify

A key activity in setting up any new relationship with a third party is to assess any cyber risks to decide whether it is safe to proceed. A cyber risk assessment also ensures that both parties can agree on terms and conditions in any agreements related to managing cybersecurity risks.

In the world of cyber risk management, this means getting some proof that sound security management practices are in place.

Read More
Why SSPM is becoming an integral part of risk management for every business

Why SSPM is becoming an integral part of risk management for every business

SaaS Security Posture Management (“SSPM”) is a new Gartner category defined as “tools that continuously assess the security risk and manage the security posture of SaaS applications.”

Core capabilities include reporting the configuration of native SaaS security settings and offering suggestions for improved configuration to reduce risk. Optional capabilities include comparison against industry frameworks and automatic adjustment and reconfiguration.

Read More
Solidifying customer confidence in security due diligence

Solidifying customer confidence in security due diligence

If you’re a B2B business looking to or already supplying to large organisations, you will probably have noticed an uptick in the number of questions and the “proof” of information security controls asked of you for systems that host business critical and customer sensitive data.

These are not difficult questions to answer but can be very time consuming. However, your reputation may be on the line over time if you fail to provide proof to your customers that internal information security management systems (ISMS) you said you have are actually enforced.

Read More