Keep creepy, scary things from landing on your computer! Out of date protection is no protection.
Social media is a reality of doing business today. For healthcare organizations, this raises tricky privacy and compliance issues.
Concluding this series… Your state’s privacy and breach notification statutes may differ from HIPAA regulations.
In Part One of a planned series of articles to look at Incident Response best practices, we start by discussing who is required to report a security incident to regulatory authorities, government agencies, or consumers/patients.
People do not use easy passwords to purposefully invite risk – we do it because they’re easy! Strong passwords are perceived as hard. But there are tricks to make creating and using secure passwords easier.
Does heightened consumer awareness translate to more secure online shopping habits? Old habits are hard to break, convenience too often trumps security and users succumb to “breach fatigue.” Share these tips for staying safe while you do your holiday shopping!
When hardware or equipment becomes obsolete or simply no longer meets the needs of your company, where does it go? If not handled correctly, the data could cause problems down the road.
Companies should have a policy that defines in specific terms what constitutes an information security incident, and provides a step-by-step process to follow when and if an incident should occur.
Teaching employees to lock their computer when they walk away is the same. It needs to become a mindless habit. Share this Security Awareness Tip with your colleagues as a reminder.
The security world is in an uproar after news that TrueCrypt is unsafe, compromised, or simply has been discontinued.