SaaS Vendor Evaluation

SaaS Vendor Evaluation: 3 Criteria For Choosing Software Part 3

Posted Leave a commentPosted in Data Privacy and Cybersecurity, International Business, Small Business

Subscribe to our YouTube channel Tricia Dunlap, Esq. ~3-4 minute read SaaS Vendor Evaluation: 3 Criteria For Choosing Software This is part three of a three-part series on choosing software and what SaaS vendor is right for your business. In part one, I talked about principles around data privacy that your business should consider and […]

Security For SaaS Applications

5 Tips To Secure your Data: Security For SaaS Applications Part 2

Posted Leave a commentPosted in Data Privacy and Cybersecurity, International Business, Small Business

Subscribe to our YouTube channel Tricia Dunlap, Esq. ~3-4 minute read 5 Tips To Secure Your Data: Security For SaaS Applications Let’s talk about security for SaaS applications and its role in choosing a SaaS vendor. This is part two of a three part series on choosing a SaaS vendor because it’s fairly complicated. If […]

What is SaaS? Choosing a SaaS Vendor

What is SaaS and Why You Need To Be Careful: 4 Tips for Picking SaaS Vendors Part 1

Posted Leave a commentPosted in Data Privacy and Cybersecurity, International Business, Small Business

Subscribe to our YouTube channel Tricia Dunlap, Esq. ~4 minute read What is SaaS and Why You Need To Be Careful: 4 Tips for Picking SaaS Vendors What is SaaS? Software as a Service is necessary for all modern businesses. It includes software such as G-Suite, MailChimp, SalesForce, and Microsoft products. But right now let’s […]

Working at home guidelines

Working at Home Guidelines: 9 Cybersecurity Tips

Posted 3 CommentsPosted in Coronavirus, Data Privacy and Cybersecurity

~7 minute read Tricia Dunlap, Esq. CIPP/US Working At Home Guidelines We expect cybercrime incidents to increase in the wake of the coronavirus. Thieves usually take advantage of social disruption and fear – cyberthieves will no doubt see COVID-19 as a ripe opportunity. Here are nine working at home guidelines in cybersecurity that you can […]