Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary Β» Generic Β» Cybersecurity – Shared Responsibility

Cybersecurity – Shared Responsibility

The cybersecurity shared responsibility model plays a great role in mitigating the various aspects of the cloud environment. 

For example, in a shared security model with GCP, Google will be responsible for ensuring that their firewalls remain impenetrable, and you, as a google cloud user, will be responsible for ensuring that you have implemented MFA, used a strong password, and don’t access your business environment that’s hosted on  GCP from open public networks. Google is responsible for guarding the cloud service, while you are responsible for guarding your own account in the cloud service.

Moreover, cybersecurity is a responsibility we all share, and each person plays a role in protecting themselves and others. Just one infected computer can spread malware to countless others. To enhance your safety online, you’ve got to follow some basic cybersecurity measures.

Best practices to ensure your online safety

  • Avoid opening suspicious-looking emails or attachments.
  • Create strong passwords and avoid sharing them with anyone.
  • Keep your operating system, browser, and critical software updated by installing updates regularly.
  • Be cautious about sharing personal information online, and use privacy settings to control the information you share.

Additional reading

How to get started with Cybersecurity Automation in 2025

As Artificial Intelligence (AI) becomes a household name in 2024, it presents both an opportunity and a challenge for cybersecurity. Cybercriminals are poised to leverage AI at the forefront of the battlefield, and so should SOC (Security Operations Center) teams need to gear up and stay abreast of the complexities. AI and ML-driven cybersecurity automation…

Cybersecurity Incident Response Plan: What It Is & How to Build One

The significance of cybersecurity is growing. The world now depends on technology more than ever before, and there are no signs that indicate a possible reversal. Organizations can no longer exclusively rely on standard cybersecurity solutions like firewalls and antivirus software. Hackers are consistently improving their strategies and are now able to easily penetrate traditional…

How to raise HIPAA Compliant in Text Messaging

Healthcare service providers regularly access or communicate protected health information (PHI) between themselves or healthcare workers. An efficient and convenient way to communicate is through text messages. While it offers speed and accessibility, it is not always secure and susceptible to a breach incident. PHI handlers must find a way to balance convenience and security….

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.