One of the main components of the Data Security Act is to perform a Risk Assessment. This component is recommended to be performed by a 3rd party security consultant. This requirement is to be in place by July 1, 2019 and is to be performed annually by July 1st.
Schools should embrace the same security protocols as any medical organization. This is an ideal benchmark and compliance obligation for them to reach.
Guest wireless poses a number of risks and privacy concerns. Beware of free wireless internet!
Employees can be coerced into stealing personal identifiable information. What steps are you taking?
Why are businesses treated like criminals when their data is stolen? Sometimes, they are the victims too.
With regulations on cyber security, you are leaving holes. Zero day threats are found daily.
If someone famous shows up in your medical office, what will your employees do? Will they post it online?
When discussing cyber security, don't judge a business by its size.
Monitoring your users usage is a key element to a cyber security policy. Forget trust! It is about security.
Cyber security is all about policy! not just products. Relying on products alone is a surefire way to get attacked.
Not being proactive with network security is the most costly expense of all.
When it comes to establishing your IT security plan, your are better off tube the purple cow than a regular cow.
We have an executive white paper on security in healthcare.
How secure are your passwords? Here are some tips to getting better passwords.
Training needs to be an integral part of your IT security plan.Properly training your team can save you millions!
You cannot purchase compliance. IT security compliance is achieved through process and products.
Some of the greatest risks to security are internal threats. Are your people staying current with the trends?