Skip to content

What does the acronym QA mean?

We interview Daniel Rodríguez, head of QA at Pandora FMS

Today, in the intriguing adventures of the Pandora FMS blog, we are finally going to discover and reveal the secret behind the initials “QA”. For this investigation we will have the help of Daniel Rodríguez, the very celebrated head of the QA team at Pandora FMS.

Thanks to him we will get rid of all doubts, as we did with other enigmatic investigations on acronyms, such as UFO, CD or, how to forget!, WTF, which made us work for months on the day-to-day of the streets and in the deepest parts of the net.

If you want to follow us again in this reading, go ahead, you will feel like someone who came out of an adventure: satisfied and eager to tell it.

How did you end up in a company like Pandora FMS?

I knew some people who worked here at the time and they recommended the company. They started by saying that “it’s the best”, “come here”, “we would make a great team, you’ll see how much you will like these people and how well they will treat you”… And, you know, I couldn’t resist.

For the inexperienced: What does QA mean?

Don’t worry, I will solve your ancestral doubt. “QA” is equal to “Quality Assurance”. My brand, my crew.

What exactly do you do in the QA team?

We run batteries of tests on the tools we offer every time something is fixed or a new feature is added to find bugs. So customers can have versions that are as stable as possible.

And you as the head of this team, what are you in charge of?

As head of QA, I am in charge of managing the team’s work, maintaining the test environment, and testing the most difficult or demanding tests.

What are the most satisfying tasks of your day to day?

Uhhh, when the release is out without any trouble and in a convenient way, it gives me a high all over my body…

And the most stressful or terrible ones?

Final pre-release testing. They tend to be very stressful because we have a release date and unforeseen events always arise at the last minute, as you can imagine.

What do you think is the most important lesson you have learned working for this company?

Adapting to situations where work is developed differently, in this case with remote working due to the current situation. Yes, that could be an example.

Any remarkable/unspeakable anecdotes at this time in Pandora FMS?

Many, almost all of them unspeakable.

What hobbies drive you crazy?

Video games and music. They blow me away.

Tell me the first thing that comes to mind when I say these words:

* Pandora: Collaboration
* Friday night: Friends
* Bugs: Work
* Sunday evening: Movie

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

How Does Pam Help Protect Healthcare Organizations?

Cyberattacks on healthcare organizations have increased in recent years. As we have already stated on our blog, this is due to the sector’s unpreparedness to deal with confidential data, since health services do not invest as they should in information security. 

In addition, health professionals, for the most part, are not trained to detect threats in virtual environments and do not receive proper awareness of the inconvenience a malicious action can cause. 

With the Covid-19 pandemic, this problem has worsened, since remote work favors access to personal devices for corporate purposes, making the IT infrastructure of institutions even more vulnerable. Because of this, we strongly recommend implementing cybersecurity solutions such as PAM to protect this infrastructure. 

In this article, we will explain what a PAM solution is and how it can benefit healthcare services. To facilitate your reading, we divided the text into three main topics:

  • What is a PAM Solution, and Why is It Important?
  • How Does Pam Help Protect Healthcare Organizations?
  • About senhasegura

Keep reading!

1. What is a PAM Solution, and Why is It Important?

Privileged Access Management (PAM) consists of strategies and tools that allow you to protect technological environments, controlling privileged access and permissions for systems, processes, accounts, and users.

In practice, this solution makes it possible to prevent and correct damage resulting from threats to privileged credentials, such as carelessness by employees and attacks by malicious agents.

Its main purpose is to apply the concept of least privilege, restricting access rights and permissions, ensuring that users have only the access necessary to perform their duties. 

For this reason, experts and technologists consider this feature one of the most important for reducing cyber risks and reinforce its advantages for the Return on Investment (ROI) in security.

2. How Does Pam Help Protect Healthcare Organizations?

PAM is a solution that benefits healthcare services and medical organizations in a variety of ways: by protecting legacy devices, managing third-party access in the environment, and protecting them against insider threats. See how senhasegura helps in these aspects:

  • Legacy Device Protection:

PAM makes it possible to remove passwords and credentials encoded in scripts, application code, and configuration files, in addition to automatically managing these passwords.

This is possible because the application receives the updated password of the resource to be accessed in a way that keeps critical data inaccessible to malicious users.

  • Third-party Management:

Medical organizations typically have a heterogeneous infrastructure, with devices from numerous manufacturers. This is a factor that adds to the complexity of the maintenance process for these devices, which rely on multiple vendors, third-party assistance, consultants, and service providers, who need access to your organization’s network resources. This type of access requires even more protection than by employees, and with the use of PAM, your system will be protected.

  • Insider Threats:

When it comes to data breaches, employees themselves can pose risks to the company. In order to avoid these risks, PAM makes it possible to limit users’ privileges and have control over access to privileged accounts.

Using this important information security tool brings a series of positive results for organizations. Among them, the following stand out:

  • Cyber Risk Reduction: PAM drastically reduces the risks associated with attacks by malicious actors in virtual environments;
  • Effective Management of Credentials: Healthcare employees will only have the necessary access to perform their duties;
  • Remote Access Protection: It is a way to protect IT systems that are more vulnerable with remote work, which has become a reality for many professionals in times of a pandemic;
  • Reduction in Incident Response Time: With PAM‘s efficiency in issuing reports, alerts, in addition to dashboards and remote session recording, operations are not stopped for a long time, nor do they cause negative impacts on productivity;
  • Unified OT and IT Security: PAM considers the convergence between OT and IT in Industry 4.0; 
  • Compliance with Security Policies: Healthcare services need to follow security policies in order to preserve the confidentiality of their patients’/clients’ data, and PAM makes it possible to adopt the necessary standards to achieve this goal.

In Brazil, the main legislation on the subject is the General Data Protection Law (LGPD), which has been in force since August 2020. 

However, the General Data Protection Regulation (GDPR) is also a reference for good security practices, as well as the Health Insurance Portability and Accountability Act (HIPAA), a set of North American protection standards aimed at health services. 

3. About senhasegura

In order to avoid the loss of information and traceability of actions in networks, databases, servers, and devices, senhasegura works to ensure digital sovereignty for institutions in various areas, including healthcare.

Also, it brings these organizations into compliance with auditing requirements and security standards, such as:

  • HIPAA;
  •  LGPD;
  •  GDPR;
  • ISO 27001;
  • PCI DSS; 
  • and Sarbanes-Oxley.

By reading this article, you have understood how a PAM solution can be useful to healthcare services.

ALSO READ IN SENHASEGURA’S BLOG

Top 5 Cyber Threats to Healthcare Organizations

Multifactor Authentication: How to Benefit from This Security Strategy

An Overview of Saudi Arabia’s Personal Data Protection Act (PDPL)

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×