Stay in the know
Your medical records are worth 500 times credit card information
Yes, you read that correctly. In 2014 medical records were worth over 10 times the value of credit cards. After several massive breaches and the loss of 100s of millions of credit cards, which were placed for sale on the dark net, the price of stolen credit card...
HIPAA Compliance – After the Risk Assessment, Then What? Data Protections
As we noted previously, there are numerous requirements for HIPAA compliance. One such item is the protection of your data – while in use, at rest, in motion, or at its disposal. PHI data can exist in many forms and is generally categorized in one of four states:...
Top 25 Shameful Passwords of 2015
More and more passwords are becoming a daily part of your life. Considering that it is recommended to never use the same password at different sites or on different apps, it can become overwhelming. Despite that, there are just some things that you should not...
HIPAA Compliance – After the Risk Assessment, Then What? HIPAA Education
As we noted previously, there are numerous requirements for HIPAA compliance. The next step we would suggest is HIPAA Training. The Education of your staff regarding what is HIPAA and what does it require is top priority and government requirement. This education...
Cyber-Security: Best Practices – Short and Sweat!
Yes, that said swEAt, not swEEt. If you think there is anything sweet about cyber-security you haven't been in it long enough. The good news is the Australian government came up with a very short list of key strategies for cyber-security best practices. This is...
HIPAA Compliance – After the Risk Assessment, Then What? Breach Detection
As we noted previously, there are numerous requirements for HIPAA compliance. A top priority after the risk assessment is cyber security to prevent and detect cyber breaches. In this age of data breaches – from cyber breaches to equipment theft/loss, addressing the...
Even the big boys don’t always protect your network and data.
If you think someone else is protecting your computers, networks and data from cyber-threats you might want to think again. You must take responsibility to implement a cyber-security plan. Even consumers need to think defensively and take action. The...
Every business needs to have a cyber-security plan.
If you're in business and have any type of connection to the Internet you need to think about how to protect your business and your customers. Here's a brief article by Kemp Little that address No Sensible business ignoring cyber threats says Kemp Little...
Focus on Technology: Anti-Virus Software Fails Us
As computer users we've become acclimated to using anti-virus software to keep our systems secure. However, in recent years that's no longer enough. Based on the security industries' numbers, anti-virus software only catches 45 to 55% of viruses and malware. Marc...
Coffee Makers and World Mayhem!
We’ve all heard or read about cyber breaches and viruses taking down clouds of computers or stealing millions of customer records. But have you ever thought about a virus shutting off your coffee maker. You might ask, “Why would a criminal want to turn off my coffee...