Blog

Managed Security for Your Company’s Biggest Obstacles

In the last year or two there has been considerable discussion centered around the lack of trained, experienced IT security personnel able to handle the growing needs that companies face as technologies and cyber threats evolve and grow. As part of Cyber Security Awareness Month, this week has focused on building the next generation of cyber … Continued

Extra Password Authentication May be Necessary, Even if Not Required

In recent months, the recommendation of Loricca’s team of security experts has changed regarding extra authentication. Where we have always favored and recommended strong authentication, we now strongly urge clients to use a system such as a two factor authentication (TFA) process as it is the only effective way to securely verify users, especially remote users. … Continued

Incomplete Data Disposal Could Come Back to Haunt You

When hardware or equipment becomes obsolete or simply no longer meets the needs of your company, where does it go?  Too often, retired equipment sits in a closet somewhere waiting to be destroyed. The longer unused equipment waits to be dealt with, the more risk is incurred that a machine will be lost or stolen … Continued

A Call to Action for Healthcare IT Security

During National Health IT Week, I am encouraged to see such a concerted effort led by the Healthcare Information and Management Systems Society (HIMSS).  Health IT Week has become a rallying point for the healthcare industry to face the challenges of advancing services with expanding technology while maintaining the security and level of service patients require. … Continued

Obstacles to EMV Adoption Common to IT Security Funding and Progress

In the 1980s, EMV (Europay, MasterCard and Visa) technology using a chip embedded in credit cards was responsible for a drastic drop in fraud involving cloned credit cards that was rampant in following the fall of the Iron Curtain. Despite good arguments for (and against) EMV technology as the worldwide standard and intense pressure from … Continued

Teach Employees the Risks that Come with Removable Storage

In life and business today we have the luxury of technology that provides unprecedented convenience and productivity.  But some of the same tools that help us do more also threaten our security and could potentially undo all our hard work. Wherever your company’s critical data or client/patient personal data can be stored or accessed, you … Continued

HIPAA Compliance as a Marketing Tool

If your company provides services within the healthcare industry that qualify it as a Business Associate (BA), the extra requirements of the HIPAA Privacy and Security Rules can actually work in your company’s favor. When your sales agents and account managers are able to speak to your company’s compliance efforts and data security, prospects are reassured that your … Continued

Are Cyber Security Risks Overstated?

Our Loricca team is based in Tampa, Florida. We happen to be in the middle of a (thankfully) light hurricane season. We like to tell ourselves we are not really at risk. Maybe that’s what people in California tell themselves about earthquakes. I often hear the same sentiment from executives and IT leaders about their … Continued

Every Employee is an MVP to Your Incident Response Team

If (when) your company encounters an IT security incident or data breach, you will need every employee ready to respond quickly and effectively as appropriate for their position. Hopefully you have an incident response plan in place and your IT team is alert and has practiced and prepared to execute that plan when necessary. Do not overlook those outside … Continued

Has Your Risk Assessment Hit the Mark?

When we work with new clients who have come to us because they have experienced a data breach or security incident, they often express frustration because they thought they had taken the necessary steps to secure their systems and data only to learn the hard way that something may have been missed. More often than not, … Continued

Is your organization HIPAA compliant?

Contact us to find out sooner rather than later.

Ask about our letters of attestation that demonstrate your compliance!