Keep creepy, scary things from landing on your computer! Out of date protection is no protection.
Neglected or incomplete risk assessment could lead to a denial of cybersecurity insurance coverage for healthcare organizations.
Concluding this series… Your state’s privacy and breach notification statutes may differ from HIPAA regulations.
We’re all excited about our team’s run for the 2016 Stanley Cup! It is the topic of conversation around the office these days. You can’t win in hockey or in cybersecurity if you forget the fundamentals. Keep security best practices as a top topic of conversation for your employees – share our latest tip with a big “Go Bolts!”
In Part One of a planned series of articles to look at Incident Response best practices, we start by discussing who is required to report a security incident to regulatory authorities, government agencies, or consumers/patients.
People do not use easy passwords to purposefully invite risk – we do it because they’re easy! Strong passwords are perceived as hard. But there are tricks to make creating and using secure passwords easier.
By all accounts, 2016 is shaping up to be the Year of Ransomware. Ransomware is nothing new but the tools and tactics have evolved. Here’s what you need to know to face the current threats.
Compliance begins with risk assessment. Security ends with incident response. And peace of mind requires reliable intelligence.
As you gear up for a productive 2016, while you are focused on getting to the next meeting or seeing the next client, realize cyber criminals could be focused on you. Plan now to stay safe on your next trip.
Could 2016 be a turning point in our ability to identify and thwart malicious attacks and close security gaps that have put us on the defensive in the past? We could be in for an exciting New Year for cybersecurity.