Solve Your Trickiest Compliance and Cyber Security Problems

So much is written and discussed about cyber security and compliance today. It can be overwhelming and even discouraging when it seems there is a never ending list of threats and regulatory demands on your organization. Doing everything you think you need to do or would like to do is impossible.  At least today, all … Continued

Security Tips for Business Travel

As you gear up for a productive 2016, while you are focused on getting to the next meeting or seeing the next client, realize cyber criminals could be focused on you. Plan now to stay safe on your next trip. If your job is to facilitate travel (logistically, technically, or managerially) for your employees, share … Continued

Looking Forward to an Exciting New Year for Cybersecurity

Standing on the verge of another New Year, it is a tremendous time to work in IT Security. For several years, most of our clients have been primarily motivated by compliance concerns to implement and document best practices for securing critical data and systems against hackers, theft, and loss. Approaching 2016, I sense a shift in understanding … Continued

Stay Safe Shopping Online

With high profile breaches in the news regularly, consumers have an increased awareness of online dangers and the constantly evolving tactics of cyber criminals out to steal their data. But does this heightened awareness translate to more secure online habits? Too often, old habits are hard to break, convenience trumps security, or people simply succumb … Continued

Retailers and Consumers Face Holiday Shopping Risks

With the holiday shopping season in full swing, security experts, retailers and shoppers alike face the coming weeks with vivid memories of the Target holiday breach two years ago and the series of hacks and data theft we have seen since. It comes down to each of us to be on alert and to be … Continued

The Long Anticipated Next Round of HIPAA Audits Finally Taking Shape

We have been urging clients, covered entities and business associates to prepare for almost two years. As I have said many times, being prepared for an audit is more about taking the appropriate and responsible steps toward compliance and security than it is about the likelihood that your organization will actually be chosen. Shifted Focus … Continued

Don’t Fall for Social Engineering Tactics

Your employees may not realize how valuable their access may be to dangerous cyber criminals. Hackers can be very clever when they want the critical data or credentials that your employees possess. Social engineering tactics are designed to obtain secure information (login, customer, patient, or corporate data) by conning a person into revealing the information. Hackers’ … Continued

Cybersecurity Priorities – Following the Lead of the Feds

Last Friday, as many of us had our minds on Halloween plans, Tony Scott released the Cyber Security Strategy and Implementation Plan for federal cybersecurity. Scott, former VMWare exec and sitting federal CIO, released his recommended priorities for federal agencies following the “Sprint” assessment conducted over the summer. One has to think the Federal government, all the … Continued

Managed Security for Your Biggest Obstacles

In the last year or two there has been considerable discussion centered around the lack of trained, experienced IT security personnel able to handle the growing needs that companies face as technologies and cyber threats evolve and grow. As part of Cyber Security Awareness Month, this week has focused on building the next generation of cyber … Continued

Extra Password Authentication May be Necessary, Even if Not Required

In recent months, the recommendation of Loricca’s team of security experts has changed regarding extra authentication. Where we have always favored and recommended strong authentication, we now strongly urge clients to use a system such as a two factor authentication (TFA) process as it is the only effective way to securely verify users, especially remote users. … Continued

Is your organization HIPAA compliant?

Contact us to find out sooner rather than later.

Ask about our letters of attestation that demonstrate your compliance!