A guide to Information Security Standards
The Information Security industry has created a confusing and large variety of Information Security Standards (Cyber Security Standards), frameworks and maturity models.
By the end of this blog you should understand what each of the major standards cover, how it came into existence and if it is relevant to your business.
Satalyst’s Security Practice – Securing the Cloud
Securing the cloud - Satalyst is excited to announce our new Security and Automation Practice. "Through 2025, 99% of cloud security failures will be the customer’s fault. 1
"Whether you use Public, Private or a Hybrid cloud solution, any cloud offering is only as secure as how you have configured it. In nearly all cases, security breaches happen due to misconfiguration, inappropriate access controls or mismanagement by third party providers.

Do you need a bit of help with Dynamics 365 CRM?
Do you need help getting the most out of your CRM? Want to talk to someone who can talk about the business outcomes rather than just the technology? We have over 10 years’ experience delivering and supporting Microsoft Dynamics 365 CRM based solutions and we can help you do more with your CRM.
Read More