by Ignacio Martinez on April 26, 2018 Thanks in large part to the proliferation of enterprise collaboration tools, organizations today face a new work paradigm. These tools, coupled with other advances in technology, have made collaboration and communication easier. Simultaneously, data is now more accessible and available to more people, and more easily shared — both inside and outside of an organization — than ever before.
At the same time, one just needs to look at any news feed to see that IT leaders and other business leaders responsible for security and compliance are facing increased scrutiny around data security and privacy, as well as a greater demand for the ability to demonstrate compliance and adherence to new regulatory issues. These changes create competing forces in an organization. People need visibility into and access to the data and information they need to get their work done, without compromising data security or regulatory compliance. by Ignacio Martinez on May 25, 2018 We take very seriously the privacy of our customers as well as their interest in keeping the personal data they entrust to Smartsheet private and secure.
We’re pleased to announce that Smartsheet has updated our policies and practices in light of the changing privacy landscape, including the introduction of the European Union’s General Data Protection Regulation (GDPR), which goes into effect today. You can read our updated Privacy Policy here.
by Chris Magill on January 25, 2017
I recently participated in a customer security review to give an overview of Smartsheet's security architecture and how we utilize Security Enhanced (or SE) Linux. "SELinux in Enforcing mode is definitely secure," the customer responded, "... provided you were actually able to get it to work."
The customer’s skepticism was understandable… in fact, I’ve heard this same reaction many times over. When I review Smartsheet’s security architecture with customers, one of the main topics that I discuss is the fact that our application is built on Security Enhanced Linux operating in Enforcing mode. In Information Security circles, it’s a well-known secure operating system.
by Chris Magill on February 2, 2017
As more enterprises undertake digital transformation, cloud services and solutions are one of the top technology investments that CIOs plan to make this year. Yet security and privacy remains the top concern for CIOs going into 2017. This doesn’t mean that CIOs should rethink their strategy, but it does reflect the need for thorough vetting of security for any cloud services or solutions IT buyers plan to add to their portfolio.
Here are three questions to ask when assessing SaaS software to get a clearer picture of security:
by Ignacio Martinez on January 12, 2018
As more and more of our daily lives take place online, it’s only natural that we’ve become more accustomed to sharing personal, sensitive, information online. Email communication is a constant part of our daily communication – and unfortunately is also a common tool used by hackers to attempt to gain access to your sensitive information in a scheme known as phishing. Smartsheet will never email you to request sensitive data, such as passwords, credit card details, and social security numbers. As you head into a new year resolute with new intentions, we’d like you to add a renewed commitment to online security to your list. Here’s some helpful information about phishing – and how to keep yourself safe. |
AuthorWriters and Bloggers from Smartsheet. Categories
All
Archives
October 2023
|