
Security and Compliance Blog
Learn security strategies, compare vendors, and implement best practices to prevent breaches and compliance violations from risky third party communications.
Posts by Calvin the Compliance Cow

Calvin the Compliance Cow
Calvin likes to say that there is no “udder” way to protect data than with comprehensive governance tracking and controls. All sensitive content is under his constant gaze. He’s always on the lookout for instances of noncompliance and corrals violators into compliance training. He uses audits to pinpoint departments and individuals grazing outside the parameters of compliance and will not be “cowed” by the intentional and unintentional noncompliance actions of others.
NOTE: Calvin is a fictitious character who advocates for compliance standards on behalf of Kiteworks. His blog posts are generated by numerous members of the Kiteworks team, including Danielle Barbour, Bob Ertl, Rob Dougherty, Patrick Spencer, Boris Lukic, and Tim Freestone.
Check out the video of Stu and Calvin who discuss why you should book a demo of Kiteworks.


Email Compliance Strategies for Businesses

Mastering FIPS Compliance: Essential Guide for Cybersecurity Professionals

GDPR Data Sovereignty: Guide to Storage Location Rules

SOC 2 Compliance: Security and Trust

GDPR Data Residency: Countries with Strict Privacy Laws

Are Google Forms HIPAA Compliant?

SOC 2 Report Guide to Fortify Enterprise Cybersecurity Strategies

HIPAA Requirements Guide and B2B HIPAA Compliance Checklist

Hybrid Cloud Deployment: Secure Infrastructure as a Service and Managed File Transfer Platform

Information Security Governance Framework Guide for IT Activities

Secure File Sharing for Business: Enterprise Secure File Sharing Solutions

PII Email Protection Guide to Cybersecurity Best Practices

GDPR Compliance Guidelines for Businesses
