
Security and Compliance Blog
Learn security strategies, compare vendors, and implement best practices to prevent breaches and compliance violations from risky third party communications.
Posts by Stu the Security Squirrel

Stu the Security Squirrel
Stu the Security Squirrel is fastidious not only when it comes to hoarding and securing acorns but when it comes to securing company data. He constantly scampers around to protect his company’s data from accidental and intentional breaches, double encrypts, uses AI to detect anomalies, creates layers of security, embeds network firewalls and WAF, and integrates advanced threat protection capabilities. Stu often turns “purple” when dealing with employees create significant problems due to their carelessness, noncompliance, and maliciousness.
NOTE: Stu is a fictitious character who advocates for cybersecurity on behalf of Kiteworks. His blog posts are generated by numerous members of the Kiteworks team, including Bob Ertl, Rob Dougherty, Patrick Spencer, Boris Lukic , and Tim Freestone.
Check out the video of Stu and Calvin who discuss why you should book a demo of Kiteworks.


Unlocking the Essentials of HIPAA Security Rule: An In-Depth Guide

Unlocking the Benefits of Information Security Governance and Risk Management

Managed File Transfer Solutions: Secure Alternatives to FTP for Organizations

SFTP Alternative: Exploring File Transfer Protocols for Large Organizations

How Does AES Work: All About AES Algorithm Steps
