Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » Generic » Cybersecurity – Shared Responsibility

Cybersecurity – Shared Responsibility

The cybersecurity shared responsibility model plays a great role in mitigating the various aspects of the cloud environment. 

For example, in a shared security model with GCP, Google will be responsible for ensuring that their firewalls remain impenetrable, and you, as a google cloud user, will be responsible for ensuring that you have implemented MFA, used a strong password, and don’t access your business environment that’s hosted on  GCP from open public networks. Google is responsible for guarding the cloud service, while you are responsible for guarding your own account in the cloud service.

Moreover, cybersecurity is a responsibility we all share, and each person plays a role in protecting themselves and others. Just one infected computer can spread malware to countless others. To enhance your safety online, you’ve got to follow some basic cybersecurity measures.

Best practices to ensure your online safety

  • Avoid opening suspicious-looking emails or attachments.
  • Create strong passwords and avoid sharing them with anyone.
  • Keep your operating system, browser, and critical software updated by installing updates regularly.
  • Be cautious about sharing personal information online, and use privacy settings to control the information you share.

Additional reading

Internal Control Audit

Internal Control Audit: Evaluating Your Control Environment

Amidst the dance of commerce, the internal control system is a silent watchdog. It does not always make the headlines in case of breaches or system crashes, but the consequences can be devastating when controls are not in place.  Case in point: A fine of $136 million was levied on Citigroup by the US regulatory…
Secureframe alternatives

Secureframe Alternatives: Compare Top Competitor Pricing, Pros, Cons, & Rating

Picking for the perfect compliance automation tool is easier said than done—specially with alternative solutions tailor-built for different use cases. Even after hours of competitor analysis, scanning through features, mapping reviews, comparing scores, and more, you can drown in a sea of confusion.  To make your life easier, we did the hard work by compiling…
nis2 guidelines

NIS2 Guidelines Broken Down: Non-Negotiable for EU

The risk of large-scale disruptions and data breaches has skyrocketed, exposing vulnerabilities in systems essential to our everyday lives. The NIS2 directive aims to strengthen cybersecurity frameworks and ensure organizations are better prepared to tackle these threats head-on. The Network and Information Systems (NIS) 2 Directive isn’t just another boring compliance checklist. It introduces significant…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.