Incident Response 101: When Do You Need to Report a Breach?

In Part One of this series of articles discussing the basic considerations of Incident Response best practices, we began with understanding who is required to report a security incident to regulatory authorities, government agencies, or consumers/patients. In Part Two, we review when an incident must be reported. In future articles we will also consider what is to … Continued

Protect Your Company’s “Whales” from Email Fraud and Cybercrime

We have warned many times about the dangers of “phishing” scams. Cyber criminals try to trick people into revealing key personal or financial information or into clicking a link that will take them to a malware site where their system can be compromised and accessed to allow the hacker access to all sorts of valuable … Continued

Your Cyber Security Hat Trick

Even after the Tampa Bay Lightning won the Stanley Cup in 2004, many people still seem surprised that there’s hockey in Florida – great hockey! Hockey in Tampa Bay, where Loricca is based, is a big deal.  From the little guys through high school and, of course, the Bolts. We don’t really understand why, when … Continued

Ransomware And Healthcare

Is your healthcare organization at risk? Ransomware is not going away in 2017—Life Threatening to the Healthcare Industry. Previously: “The Reality of Ransomware in 2016” Ransomware in 2017 is a sophisticated type of malware that is persistently targeting the healthcare industry.  Reports indicate that attacks are growing at a shocking rate and the tools used … Continued

Incident Response 101: Who is Required to Report a Breach?

We know you have questions. In Part One of a planned series of articles to look at the basic considerations of Incident Response best practices, let’s start with understanding who is required to report a security incident to regulatory authorities, government agencies, or consumers/patients. In follow-up articles, we will also review when an incident must … Continued

Trouble Remembering Your Password? Try Singing It!

If you are responsible for training employees about security within your company, you probably have run into a disconnect between the need for secure passwords and the reality of the passwords being used. Maybe even within your own department, you know that passwords may not be as strong or changed as regularly as they should.   Knowing why something we should do … Continued

The Reality of Ransomware in 2016

By all accounts, 2016 is shaping up to be the Year of Ransomware. Of course, ransomware is nothing new. Many people may still think of ransomware as the annoying pop up we have probably all seen at some point or another throughout the last decade – the fake FBI warning locking you out of your … Continued

Long Awaited HIPAA Round Two Audits Have Begun

Announced in the spring of 2014, scheduled to begin in late 2014, OCR announced this week that a second round of HIPAA Audits (following the original 2012 audits) has finally begun. I have written over the last two years that audits were imminent. I admit it felt like crying wolf at one point. But my insistence all along … Continued

Smartphone Security And Privacy Settings

Most of us could not live today without our smart phones. If we had to, we would be much less productive; some of us might face very real business and financial (if not psychological) repercussions. We don’t even want to think about it. Apple Resists the Feds in Ongoing Privacy Debate But as ingrained in … Continued

Is your organization HIPAA compliant?

Contact us to find out sooner rather than later.

Ask about our letters of attestation that demonstrate your compliance!