{"id":75552,"date":"2024-02-19T17:25:54","date_gmt":"2024-02-19T09:25:54","guid":{"rendered":"https:\/\/version-2.com\/?p=75552"},"modified":"2024-02-07T17:29:33","modified_gmt":"2024-02-07T09:29:33","slug":"how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global-teams-security","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/02\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global-teams-security\/","title":{"rendered":"How Databook Labs met stakeholders\u2019 expectations by doubling down its global team\u2019s security"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"75552\" class=\"elementor elementor-75552\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/4ZTGNTH8pdjdo8sZGwoeZx\/190c6ed9cf1d5b75a64936008fc40ec7\/Databook_x_NordLayer_web-cover_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"617\" \/><\/p><article class=\"RichText_root__1_CNu BlogPostContent_richText__rG0U1\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Databook Labs, a pioneering company in AI, has revolutionized the enterprise sales landscape. Their exceptional ability to interpret vast financial and market data arrays has notably enhanced global strategic relationships for sales teams.\u00a0<\/p><p><img decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3xGHUcvRSeMwfPoir0R7T1\/370412fa97fcd86930c73e4c15eaeb63\/Profile_of_Databook_Labs.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3xGHUcvRSeMwfPoir0R7T1\/370412fa97fcd86930c73e4c15eaeb63\/Profile_of_Databook_Labs.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/3xGHUcvRSeMwfPoir0R7T1\/370412fa97fcd86930c73e4c15eaeb63\/Profile_of_Databook_Labs.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/3xGHUcvRSeMwfPoir0R7T1\/370412fa97fcd86930c73e4c15eaeb63\/Profile_of_Databook_Labs.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/3xGHUcvRSeMwfPoir0R7T1\/370412fa97fcd86930c73e4c15eaeb63\/Profile_of_Databook_Labs.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/3xGHUcvRSeMwfPoir0R7T1\/370412fa97fcd86930c73e4c15eaeb63\/Profile_of_Databook_Labs.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/3xGHUcvRSeMwfPoir0R7T1\/370412fa97fcd86930c73e4c15eaeb63\/Profile_of_Databook_Labs.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/3xGHUcvRSeMwfPoir0R7T1\/370412fa97fcd86930c73e4c15eaeb63\/Profile_of_Databook_Labs.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Profile of Databook Labs\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3xGHUcvRSeMwfPoir0R7T1\/370412fa97fcd86930c73e4c15eaeb63\/Profile_of_Databook_Labs.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"537\" \/><\/p><p>With users across 104 countries, the platform ingests and interprets billions of financial and market data signals to generate actionable sales strategies that connect the seller\u2019s solutions to a buyer\u2019s financial pain and urgency.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">A successful product led to rapid expansion and a distributed workforce across 8 countries. Anne Simpson, Head of Privacy, Security, and Compliance at <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"https:\/\/databook.com\/\" target=\"_blank\" rel=\"noopener\">Databook Labs<\/a>, walked us through how the company faced the pressing challenge of ensuring robust cybersecurity in a hybrid work environment.<\/p><h2 id=\"the-challenge\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">The challenge<\/h2><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Scaling up securely in a global landscape<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Databook Labs experienced accelerated growth, scaling from 12 to 100 employees and expanding to three global offices.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">First, starting at the founder\u2019s house basement, the company grew and got its first office before the pandemic. Changing team location and scale required an established security mindset.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Besides, this rapid development and a primarily remote workforce presented significant cybersecurity challenges.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cWith a mostly remote workforce, Databook needed a way to secure data while working away from our known networks.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CWith%20a%20mostly%20remote%20workforce,%20Databook%20needed%20a%20way%20to%20secure%20data%20while%20working%20away%20from%20our%20known%20networks.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fhow-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Their primary concern was safeguarding data across numerous unknown networks, a critical issue given their large enterprise customer base with stringent security expectations.<\/p><h2 id=\"the-solution\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">The solution<\/h2><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Choosing NordLayer for comprehensive security<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">When Anne Simpson, Head of Privacy and Security, joined Databook Labs, she recognized the need for a robust VPN solution to protect their global, remote workforce.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cThe majority of our customers are large enterprises that want to see high-security standards in place.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CThe%20majority%20of%20our%20customers%20are%20large%20enterprises%20that%20want%20to%20see%20high-security%20standards%20in%20place.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fhow-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Besides securing a remote workforce, Anne was also responsible for developing, maintaining, and enforcing Databook\u2019s information security policies to meet client expectations.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cWe encourage people to get out there and explore the world while working. When they appear on an unknown network, I can&#8217;t guarantee the data transmission&#8217;s security, so we had to get a VPN.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CWe%20encourage%20people%20to%20get%20out%20there%20and%20explore%20the%20world%20while%20working.%20When%20they%20appear%20on%20an%20unknown%20network,%20I%20can't%20guarantee%20the%20data%20transmission's%20security,%20so%20we%20had%20to%20get%20a%20VPN.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fhow-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The integration of NordLayer allowed the company to maintain a high level of security without the need for extensive in-house resources.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cWe are a very small team, so we don&#8217;t have the resources to build a VPN and maintain one in the house. And that&#8217;s what we love about NordLayer.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CWe%20are%20a%20very%20small%20team,%20so%20we%20don't%20have%20the%20resources%20to%20build%20a%20VPN%20and%20maintain%20one%20in%20the%20house.%20And%20that's%20what%20we%20love%20about%20NordLayer.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fhow-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Compatibility, security, and simplicity are the key characteristics NordLayer solution proved to be the top pick.<\/p><h2 id=\"why-choose-nordlayer\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Why choose NordLayer<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">After thorough research and peer consultations, NordLayer emerged as the ideal choice. Its ease of implementation, excellent customer support, and compatibility with non-technical users made it a perfect fit for Databook Labs.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The company already had SOC 2 certification, so adding NordLayer to our policies and procedures made it all about privacy and security at Databook Labs.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cAfter the demo, we felt that NordLayer was the easiest to implement. It gave us everything we needed, and the team was really helpful. We&#8217;ve never had a problem with any customer service support issues.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CAfter%20the%20demo,%20we%20felt%20that%20NordLayer%20was%20the%20easiest%20to%20implement.%20It%20gave%20us%20everything%20we%20needed,%20and%20the%20team%20was%20really%20helpful.%20We've%20never%20had%20a%20problem%20with%20any%20customer%20service%20support%20issues.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fhow-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">As Anne Simpson claims, the tool doesn\u2019t require manual handling, and the security manager doesn\u2019t need to worry about it.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">How NordLayer helps manage the expectations of different parties<\/h3><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2u5EI4VWezaBNomZ4WF4Cb\/d067047afcc6dc802f17109901745a01\/How_NordLayer_helps_manage_the_expectations_of_different_parties.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"587\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Overall, NordLayer simplifies the experience of enabling and using a remote network access security tool. It&#8217;s designed to be user-friendly for non-tech-savvy employees while meeting the high standards expected by clients and stakeholders.<\/p><h2 id=\"the-outcome\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">The outcome<\/h2><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Enhanced security and operational efficiency<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Implementing NordLayer had a profound impact on Databook Labs. Anne Simpson and her team found peace of mind in knowing that their data was secure and that they were in compliance with global regulations.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cNordLayer is very user-friendly. During onboarding, our team members receive training on using the VPN, and the Okta integration plays a crucial role. They are well-versed in when it is most beneficial to be connected to the VPN.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CNordLayer%20is%20very%20user-friendly.%20During%20onboarding,%20our%20team%20members%20receive%20training%20on%20using%20the%20VPN,%20and%20the%20Okta%20integration%20plays%20a%20crucial%20role.%20They%20are%20well-versed%20in%20when%20it%20is%20most%20beneficial%20to%20be%20connected%20to%20the%20VPN.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fhow-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer&#8217;s solution, with its simplicity, allowed the team to dedicate more time to strategic objectives. It also made it easy for non-technical employees, eliminating the need to manage VPN complexities.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cI would recommend NordLayer VPN as it is simple to use and does not incur any upfront costs, such as setting up our own VPN and needing on-premises hardware.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CI%20would%20recommend%20NordLayer%20VPN%20as%20it%20is%20simple%20to%20use%20and%20does%20not%20incur%20any%20upfront%20costs,%20such%20as%20setting%20up%20our%20own%20VPN%20and%20needing%20on-premises%20hardware.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fhow-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Additionally, NordLayer&#8217;s performance causes any issues with the company&#8217;s operations, easing initial concerns about potential slowdowns.<\/p><h2 id=\"pro-cybersecurity-tips\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Pro cybersecurity tips<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Everyday cybersecurity rules should become a mantra of every tech user in the modern world. But sometimes, it\u2019s not that obvious where to start. Thus, here are the main recommendations from the Head of Privacy, Security &amp; Compliance at Databook Labs, where it\u2019s worth concentrating your focus to begin with.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1FxkWBWre2GGqeHb3zgwqM\/1b0e7dfc4ed1ca6d7e124b08d289362f\/Quotes_of_Databook_Labs.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1FxkWBWre2GGqeHb3zgwqM\/1b0e7dfc4ed1ca6d7e124b08d289362f\/Quotes_of_Databook_Labs.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/1FxkWBWre2GGqeHb3zgwqM\/1b0e7dfc4ed1ca6d7e124b08d289362f\/Quotes_of_Databook_Labs.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/1FxkWBWre2GGqeHb3zgwqM\/1b0e7dfc4ed1ca6d7e124b08d289362f\/Quotes_of_Databook_Labs.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/1FxkWBWre2GGqeHb3zgwqM\/1b0e7dfc4ed1ca6d7e124b08d289362f\/Quotes_of_Databook_Labs.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/1FxkWBWre2GGqeHb3zgwqM\/1b0e7dfc4ed1ca6d7e124b08d289362f\/Quotes_of_Databook_Labs.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/1FxkWBWre2GGqeHb3zgwqM\/1b0e7dfc4ed1ca6d7e124b08d289362f\/Quotes_of_Databook_Labs.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/1FxkWBWre2GGqeHb3zgwqM\/1b0e7dfc4ed1ca6d7e124b08d289362f\/Quotes_of_Databook_Labs.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Quotes of Databook Labs\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1FxkWBWre2GGqeHb3zgwqM\/1b0e7dfc4ed1ca6d7e124b08d289362f\/Quotes_of_Databook_Labs.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"543\" \/><\/p><p>Databook Labs&#8217; experience using NordLayer proves that being accountable for data security is challenging with remote teams yet achievable using the right solutions. Discover how compatible your cybersecurity strategy is with the NordLayer tool and enjoy the peace of mind it brings to every IT manager who uses it.<\/p><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6157f1 elementor-widget elementor-widget-video\" data-id=\"c6157f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/5eMQfaZchLw?si=SVTzWBWK3bBATcRR&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dc5b17 elementor-widget elementor-widget-text-editor\" data-id=\"6dc5b17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"max-w-post-content\"><div class=\"block md:hidden\"><div>\u00a0<\/div><\/div><div class=\"style_postContent__uJLGT text-black break-words\" data-content-type-blog=\"true\"><div class=\"Article_wrapper__YyQ2_\"><h2 id=\"IoT Malware Attacks Hit a 400% Increase\" class=\"text-h2 leading-none text-left\"><b>IoT Malware Attacks Hit a 400% Increase<\/b><\/h2><p class=\"text-base leading-normal\">So, what\u2019s the problem with these handy IoT devices? In short: they can be hacked \u2013 easily. Designed with functionality and convenience in mind, security has taken a back seat. This low level of protection leaves users vulnerable to attack, and IoT devices have become prime targets for cyberattacks. In fact, the <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/info.zscaler.com\/resources-industry-reports-threatlabz-2023-enterprise-ioT-ot-threat-report\" target=\"_blank\" rel=\"noopener noreferrer\">Zscaler ThreatLabz research team<\/a> found that IoT malware attacks increased 400% in the first half of 2023 compared to 2022.\u00a0<\/p><h2 id=\"EU Cyber Resilience Act\" class=\"text-h2 leading-none text-left\"><b>EU Cyber Resilience Act<\/b><\/h2><p class=\"text-base leading-normal\">On a legislative level, the EU is taking this seriously. The upcoming <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/cyber-resilience-act\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Resilience Act (CRA)<\/a> is already striking fear into the hearts of device manufacturers the world over. But for consumers, the future of IoT looks bright, or at least more secure.<\/p><p class=\"text-base leading-normal\">If passed, the CRA \u201cwould see inadequate security features become a thing of the past with the introduction of mandatory cybersecurity requirements for manufacturers and retailers of such products, with this protection extending throughout the product lifecycle.\u201d<\/p><p class=\"text-base leading-normal\">This is a huge development: Device makers will have to ensure the security of their products past sale. That means regular updates, security patches, and consumer safety being higher on the priority list than ever before. It&#8217;s a big shift towards a more secure digital landscape. Smart <i>and<\/i> secure homes are the future.<\/p><h2 id=\"US Cyber Trust Mark\" class=\"text-h2 leading-none text-left\"><b>US Cyber Trust Mark<\/b><\/h2><p class=\"text-base leading-normal\">While the EU is laying down the law, the US Federal Communications Commission (FCC) is planning to roll out its new \u201clabeling program for smart devices\u201d in 2024. The <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/www.fcc.gov\/cybersecurity-certification-mark\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Trust Mark<\/a> will be the shiny new seal of approval for cyber-secure products.<\/p><p class=\"text-base leading-normal\"><a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/www.youtube.com\/watch?v=odaklOk1G8I\" target=\"_blank\" rel=\"noopener noreferrer\">Jessica Rosenworcel, FCC Chairwoman says<\/a>: \u201cThe Cyber Trust Mark will help consumers make more informed decisions about what kind of devices they bring into their homes and businesses. So when you need a baby monitor, or a new appliance, you\u2019ll be able to look for a Cyber Trust Mark\u2026 device manufacturers are going to be able to showcase privacy and security in the marketplace by displaying this mark\u201d.<\/p><p class=\"text-base leading-normal\">Manufacturers will be permitted to place the seal on products only after official assessment. And though this is still a voluntary seal, i.e. manufacturers aren\u2019t legally obliged to earn it, it\u2019s a step in the right direction for IoT cybersecurity. If you\u2019re in the US, <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/www.fcc.gov\/cybersecurity-certification-mark\" target=\"_blank\" rel=\"noopener noreferrer\">keep an eye out for this logo<\/a> when making future device purchases.<\/p><h2 id=\"IoT vulnerabilities &amp; security tips\" class=\"text-h2 leading-none text-left\"><b>IoT vulnerabilities &amp; security tips<\/b><\/h2><p class=\"text-base leading-normal\">While <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/www.iotevolutionworld.com\/iot\/articles\/457529-better-security-required-iot-malware-attacks-hit-400.htm\" target=\"_blank\" rel=\"noopener noreferrer\">most IoT malware attacks are aimed at businesses<\/a> (manufacturing and education are among the most targeted sectors), consumers should stay vigilant as well. There are several avenues through which attackers can infiltrate your home networks using IoT devices. Here are a few ways that you can protect yourself.<\/p><ul class=\"list-disc ml-24\"><li class=\"ml-20\"><div><p class=\"text-base leading-normal\"><b>Default logins<\/b> \u2013 ISPs and modem\/router companies tend to distribute network devices with default logins. These credentials are easily accessible online. A typical username is \u201cadmin\u201d, passwords might be basic codes like 1234 or 0000. Easy pickings for hackers \u2013 and easy for you to change.<\/p><\/div><\/li><\/ul><ul class=\"list-disc ml-24\"><li class=\"ml-20\"><div><p class=\"text-base leading-normal\"><b>Auto-update<\/b> \u2013 If this feature is turned off and you miss security updates, your device will stay open to vulnerabilities longer. Turn on auto-update to avoid this. Smart devices with legacy firmware are the bread and butter of IoT hackers.<\/p><\/div><\/li><\/ul><ul class=\"list-disc ml-24\"><li class=\"ml-20\"><div><p class=\"text-base leading-normal\"><b>Separate network for IoT<\/b> \u2013 Keep your devices insulated from your main home network. This acts as an effective layer of security if one of your devices is compromised.<\/p><\/div><\/li><\/ul><ul class=\"list-disc ml-24\"><li class=\"ml-20\"><div><p class=\"text-base leading-normal\"><b>Principle of least privilege<\/b> \u2013 Turn off certain \u201csmart\u201d features that you don\u2019t use. Why does your toaster have a camera anyway?<\/p><\/div><\/li><\/ul><p class=\"text-base leading-normal\">With new regulations taking effect this year and our own proactive security measures at home, a safer cyber future is possible for all.<\/p><p class=\"text-base leading-normal\"><a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/open.spotify.com\/show\/3GknIs7CwqyWStfoy5k3L0?si=e6e152a9dd4949ab\"><b>Listen to the Cyberview podcast on Spotify.<\/b><\/a><\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cf03edf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cf03edf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b576c6d\" data-id=\"b576c6d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfd91ca elementor-widget elementor-widget-shortcode\" data-id=\"bfd91ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9e34e91 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"9e34e91\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb2c932\" data-id=\"bb2c932\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c6a493c elementor-widget elementor-widget-text-editor\" data-id=\"c6a493c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Databook Labs, a pioneering company in AI, has revoluti [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1130,1273,61],"tags":[974,1132,1272],"class_list":["post-75552","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-nordlayer","category-1273","category-press-release","tag-nord-security","tag-nordlayer","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Databook Labs met stakeholders\u2019 expectations by doubling down its global team\u2019s security - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Databook Labs met stakeholders\u2019 expectations by doubling down its global team\u2019s security - Version 2\" \/>\n<meta property=\"og:description\" content=\"Databook Labs, a pioneering company in AI, has revoluti [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-19T09:25:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/4ZTGNTH8pdjdo8sZGwoeZx\/190c6ed9cf1d5b75a64936008fc40ec7\/Databook_x_NordLayer_web-cover_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/02\\\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global-teams-security\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"How Databook Labs met stakeholders\u2019 expectations by doubling down its global team\u2019s security\",\"datePublished\":\"2024-02-19T09:25:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/02\\\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global-teams-security\\\/\"},\"wordCount\":1529,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/4ZTGNTH8pdjdo8sZGwoeZx\\\/190c6ed9cf1d5b75a64936008fc40ec7\\\/Databook_x_NordLayer_web-cover_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"keywords\":[\"Nord Security\",\"NordLayer\",\"2024\"],\"articleSection\":[\"Nord Security\",\"NordLayer\",\"2024\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/02\\\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global-teams-security\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\\\/\",\"name\":\"How Databook Labs met stakeholders\u2019 expectations by doubling down its global team\u2019s security - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/4ZTGNTH8pdjdo8sZGwoeZx\\\/190c6ed9cf1d5b75a64936008fc40ec7\\\/Databook_x_NordLayer_web-cover_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"datePublished\":\"2024-02-19T09:25:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/4ZTGNTH8pdjdo8sZGwoeZx\\\/190c6ed9cf1d5b75a64936008fc40ec7\\\/Databook_x_NordLayer_web-cover_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/4ZTGNTH8pdjdo8sZGwoeZx\\\/190c6ed9cf1d5b75a64936008fc40ec7\\\/Databook_x_NordLayer_web-cover_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Databook Labs met stakeholders\u2019 expectations by doubling down its global team\u2019s security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Databook Labs met stakeholders\u2019 expectations by doubling down its global team\u2019s security - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\/","og_locale":"en_US","og_type":"article","og_title":"How Databook Labs met stakeholders\u2019 expectations by doubling down its global team\u2019s security - Version 2","og_description":"Databook Labs, a pioneering company in AI, has revoluti [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\/","og_site_name":"Version 2","article_published_time":"2024-02-19T09:25:54+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/4ZTGNTH8pdjdo8sZGwoeZx\/190c6ed9cf1d5b75a64936008fc40ec7\/Databook_x_NordLayer_web-cover_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/02\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global-teams-security\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"How Databook Labs met stakeholders\u2019 expectations by doubling down its global team\u2019s security","datePublished":"2024-02-19T09:25:54+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/02\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global-teams-security\/"},"wordCount":1529,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/4ZTGNTH8pdjdo8sZGwoeZx\/190c6ed9cf1d5b75a64936008fc40ec7\/Databook_x_NordLayer_web-cover_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","keywords":["Nord Security","NordLayer","2024"],"articleSection":["Nord Security","NordLayer","2024","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/02\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global-teams-security\/","url":"https:\/\/nordlayer.com\/blog\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\/","name":"How Databook Labs met stakeholders\u2019 expectations by doubling down its global team\u2019s security - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/4ZTGNTH8pdjdo8sZGwoeZx\/190c6ed9cf1d5b75a64936008fc40ec7\/Databook_x_NordLayer_web-cover_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","datePublished":"2024-02-19T09:25:54+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordlayer.com\/blog\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/4ZTGNTH8pdjdo8sZGwoeZx\/190c6ed9cf1d5b75a64936008fc40ec7\/Databook_x_NordLayer_web-cover_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/4ZTGNTH8pdjdo8sZGwoeZx\/190c6ed9cf1d5b75a64936008fc40ec7\/Databook_x_NordLayer_web-cover_1400x800.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/how-databook-labs-met-stakeholders-expectations-by-doubling-down-its-global\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"How Databook Labs met stakeholders\u2019 expectations by doubling down its global team\u2019s security"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-jEA","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/75552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=75552"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/75552\/revisions"}],"predecessor-version":[{"id":75560,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/75552\/revisions\/75560"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=75552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=75552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=75552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}