Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » Generic » Cybersecurity – Shared Responsibility

Cybersecurity – Shared Responsibility

The cybersecurity shared responsibility model plays a great role in mitigating the various aspects of the cloud environment. 

For example, in a shared security model with GCP, Google will be responsible for ensuring that their firewalls remain impenetrable, and you, as a google cloud user, will be responsible for ensuring that you have implemented MFA, used a strong password, and don’t access your business environment that’s hosted on  GCP from open public networks. Google is responsible for guarding the cloud service, while you are responsible for guarding your own account in the cloud service.

Moreover, cybersecurity is a responsibility we all share, and each person plays a role in protecting themselves and others. Just one infected computer can spread malware to countless others. To enhance your safety online, you’ve got to follow some basic cybersecurity measures.

Best practices to ensure your online safety

  • Avoid opening suspicious-looking emails or attachments.
  • Create strong passwords and avoid sharing them with anyone.
  • Keep your operating system, browser, and critical software updated by installing updates regularly.
  • Be cautious about sharing personal information online, and use privacy settings to control the information you share.

Additional reading

NIS2 Directive Training Requirements: What Your Team Must Cover

A subtle shift is taking shape in cybersecurity regulation. NIS2, the European Union’s new directive, introduces obligations that may appear modest initially but have far-reaching implications for organizations across various sectors.  Slowly and almost imperceptibly, these requirements can affect every corner of operations. The question is whether teams are ready to meet this gradual rise…

How to Build an Effective Data Protection Strategy

Businesses today have their data distributed across the cloud, partner networks, data centers, and on-premise locations. This could include data of varying levels of sensitivity such as customer data, financial records, and other business essential information. Protecting such information requires a great deal of resources. Every company aims to minimize the heightened risks of potential…

From Entry-Level to Expert: How to Build a Resilient Career in GRC

If you’re here as an aspiring mid-level or entry-level GRC professional—or even someone looking to break into GRC cybersecurity with dreams of becoming a CISO down the line—then there’s some news for you: the not-so-good and the good.  The not-so-good news? The path ahead isn’t as straightforward as you might hope. The demands from entry-level…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.