The New IT: From Helpdesk to Business Operations

May 24, 2018 in SaaS Management, Security, Shadow IT

By: Matt Tharp

A recent study from Cisco showed that the average organization has 15 to 22 times more cloud applications running than have been authorized by the IT department. The question is, if everyone’s installing their own SaaS apps, who’s responsible for the role of IT at an organization? This question challenges every business, from startups to enterprises, and can serve as a major point of frustration for those assigned the role of IT management. Let’s take a look at why the problem of IT ownership exists, and how smart organizations should be handling it today.

Continue reading »

SOC 2 and Data Access Controls: What You Need to Know

March 29, 2018 in Compliance, SaaS Stack, Security


Guest post by Schuyler Brown, co-founder strongDM

As a part of our Blissfully SOC 2 compliance series, we invited strongDM to write a guest blog post about the challenges of data access controls, and why database management is important in the scheme of completing a SOC 2 audit. Blissfully used strongDM in our SOC 2 technology stack, mapped to the audit requirement of logical and physical access controls. Read more in our recently published SOC 2 Compliance Playbook.

Continue reading »

The Best VPN for Business Users

July 31, 2016 in Security

Why use a VPN?

As we highlighted in our business IT overview, any time you’re on public wifi, you’re exposing data that is not being transmitted securely via https. Public Wi-Fi is everywhere nowadays, and a major convenience, making it more important than ever to take the necessary precautions needed to safeguard themselves.

Continue reading »

Business IT Security – Overview

July 31, 2016 in Security

IT security is absolutely critical to any organization, especially as more and more activity and communication happens online via leading SaaS products, and not just behind the company firewall. Managing security is always a delicate balance between cost, convenience, and protection. Small businesses often avoid or delay implementing stronger security, and while it often works because they’re not directly attacked, security by obscurity is a faulty tactic.

Here we’ll review some best practices and relative tradeoffs, and initial recommendations to help make businesses more secure.

Continue reading »