Security is of the utmost importance in the modern digital age, and we take it very seriously at CobbleStone. In addition to taking CISA's (Cybersecurity and Infrastructure Security Agency) Secure by Design Pledge, we utilize a robust, multi-layered defense to safeguard our clients' data and systems. This blog entry describes some of the most important security measures we have in place, with a focus on our proactive strategy for threat mitigation and data protection.
CobbleStone® Takes CISA's Secure by Design Pledge for as Security Attestation
By Sean Heck on 02/19/25
Let’s Talk SaaS Security: Protecting Your Apps & Data in the Cloud
By Sean Heck on 08/20/24
As many businesses transition to cloud applications, Software as a Service (SaaS) has captured the pragmatic zeitgeist of modern operations. As with any new technological era, this shift has come with novel security challenges. Maintaining SaaS security is a critical business priority that multifold organizational resources should be invested in. To that end, let's dig deeper!
The Benefits of a Secure Contract Repository
By Sean Heck on 06/5/24
Successful contract management requires you to embrace a centralized and secure process. Manual contract management methods - such as filing cabinets for paper documentation, shared drives, spreadsheets, emails, and disorganized digital storage – won’t cut it as your contract portfolio grows. These methods make it nearly impossible for your organization to maintain version control, keep contracts and data secure, stay on top of key dates and milestones, and enforce contract archiving and retention rules. Your organization can scrap these outdated methods in favor of something better. As such, here are the benefits of a secure contract repository within leading, AI-powered contract management software.
Why Your Software Provider Needs To Be SOC 1 Compliant
By Joshua Hansen on 11/18/20
Why do you trust your software provider? Is there any specific criteria by which you measure a software system’s trustworthiness in protecting sensitive and confidential data such as PCI (payment card information), PII (personally identifiable information), employee information, client details, vendor data, and vital contract data? With increased risk of data and security breaches, especially during such uncertain times as these, you should be confident that your information is stored on a trusted platform. Read on to learn how to use such a trusted platform, along with the importance of SOC compliance.