
Security and Compliance Blog
Learn security strategies, compare vendors, and implement best practices to prevent breaches and compliance violations from risky third party communications.
Posts by Stu the Security Squirrel

Stu the Security Squirrel
Stu the Security Squirrel is fastidious not only when it comes to hoarding and securing acorns but when it comes to securing company data. He constantly scampers around to protect his company’s data from accidental and intentional breaches, double encrypts, uses AI to detect anomalies, creates layers of security, embeds network firewalls and WAF, and integrates advanced threat protection capabilities. Stu often turns “purple” when dealing with employees create significant problems due to their carelessness, noncompliance, and maliciousness.
NOTE: Stu is a fictitious character who advocates for cybersecurity on behalf of Kiteworks. His blog posts are generated by numerous members of the Kiteworks team, including Bob Ertl, Rob Dougherty, Patrick Spencer, Boris Lukic , and Tim Freestone.
Check out the video of Stu and Calvin who discuss why you should book a demo of Kiteworks.


Secure File Sharing: Comprehensive Guide to Free Software

AES-256 Encryption Guide for IT Leaders

Jonathan Yaron: Guide to Network Security Strategies

Does HIPAA Require Encryption? Guide to HIPAA Data Encryption

Encrypted File Sharing: Secure and Integrated File Transfer

AES 256-Bit Encryption: Symmetric Key Cryptography Examples

Google Forms HIPAA Compliant Requirements: Ensuring Data Security and Compliance

What Is Information Security Governance in Cybersecurity?

Enterprise SFTP Security Best Practices

Unlocking the HIPAA Encryption Rule: A Comprehensive Guide for Compliance

Mastering HIPAA Audit Log Requirements: A Comprehensive Guide

Managed File Transfer Enhancing Security and Efficiency for Enterprises

Enterprise File Transfer Software: Secure Alternatives to FTP
