HIPAA

D36d0936f0c839be7bf2b20d59eaa76d

Cloud Security: It’s in the Cloud - But Where? (Part III)

July 06, 2015 Added by:Steve Durbin

Part III in this series looks at the need to institute a cloud assessment process and the four actions that organizations of all sizes can take to better prepare themselves as they place their sensitive data in the cloud.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cloud Security: It’s in the Cloud - But Where? (Part II)

June 22, 2015 Added by:Steve Durbin

Cyber resilience has never been more important than it is today. As everything from supply chain management to customer engagement shifts to the cloud, operating in cyberspace now has bottom line implications if systems are disrupted. Cyber cloud resilience requires a balanced approach that protects both organizations and individuals while also enabling open, safe commerce and communication.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cloud Security: It’s in the Cloud - But Where? (Part I)

June 15, 2015 Added by:Steve Durbin

Organizations are becoming increasingly dependent on their use of cloud services for business benefit both internally and when working with third party suppliers across multiple jurisdictions. However, while these services can be implemented quickly and easily, organizations need to have a clearer understanding of where their information is stored and how reliable these services are.

Comments  (0)

959779642e6e758563e80b5d83150a9f

What is PHI?

June 03, 2015 Added by:Danny Lieberman

Software Associates specialize in HIPAA security and compliance for Israeli medical device companies – and 2 questions always come up: “What is PHI?” and “What is electronically protected health information?”

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

SSL and TLS Update

May 26, 2015 Added by:PCI Guru

The answer to SSL and TLS vulnerabilities are to remediate as soon as possible. If you are unable to remediate, then you need to mitigate the risk until you can remediate.

Comments  (0)

65be44ae7088566069cc3bef454174a7

Will Your Contractors Take Down Your Business?

May 25, 2015 Added by:Rebecca Herold

Do you know how well your vendors, business associates, contracted third parties (who I will collectively call “contractors”) are protecting the information with which you’ve entrusted them to perform some sort of business activity? You need to know.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Whole Disk Encryption Explained

May 18, 2015 Added by:PCI Guru

There are a lot of security professionals and lay people that seem to believe that encryption is encryption and that is simply not the case.

Comments  (0)

Default-avatar

New PCI DSS Changes are Around the Corner

May 12, 2015 Added by:Don Brooks

The latest payment card industry data security standard, a set of requirements designed to help businesses better secure their customers’ payment card information, took effect January 1, 2015, however some of the changes become mandatory at the end of next month.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Embracing Cyber Resilience in Today's Cyber-Enabled World

May 06, 2015 Added by:Steve Durbin

Organizations function in a progressively cyber-enabled world today and traditional risk management isn’t nimble enough to deal with the risks from activity in cyberspace. Enterprise risk management needs to be extended to create risk resilience, built on a foundation of preparedness.

Comments  (0)

6a71825dbf6d876764b845e0fd664e0b

5 Ways Schools Can Upgrade Cyber Security

May 06, 2015 Added by:Paul Lipman

Today’s cyber criminals are more aggressive than ever before in their quest to achieve financial gains through hacking. With that being said, it should come as no surprise that our nation's schools are a prime target for such attacks. In this article, iSheriff CEO Paul Lipman highlights the five actions that can be taken to upgrade cyber security practices.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

By All Means, Do as Little as Possible

May 04, 2015 Added by:PCI Guru

I write this because I have had enough of arguing over the lowest common denominator when it comes to securing networks, servers and applications.

Comments  (0)

Default-avatar

Four Steps to An Effective Privacy Program

April 27, 2015 Added by:Angela Matney

Privacy is not just a concern for large, multinational corporations. Today, businesses of all sizes collect and store more personal data than ever before.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Why Requirement 5 Must Change

April 21, 2015 Added by:PCI Guru

The issue is the ineffectiveness of anti-virus solutions and why they are ineffective.

Comments  (0)

0ead717779244d9aab5c1699308850d2

PCI DSS 3.1 Sets Deadline for SSL Migration

April 16, 2015 Added by:Brian Prince

The PCI Security Standards Council (PCI SSC) has released the latest version of the PCI Data Security Standard (PCI DSS) with an eye towards addressing security concerns related to the Secure Sockets Layer (SSL) protocol.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

ASV Guidance for SSL/TLS Vulnerabilities

April 16, 2015 Added by:PCI Guru

Hidden by all of the news about v3.1 of the PCI DSS being published, is a notice that was sent to all PCI approved scanning vendors (ASV) from the PCI SSC regarding how to handle SSL and “early TLS” vulnerabilities.

Comments  (0)

6a71825dbf6d876764b845e0fd664e0b

Cybersecurity Trends for SMBs: Mobile, Security and the Cloud

April 10, 2015 Added by:Paul Lipman

While SMBs are vulnerable to many of the same types of attacks as the companies making headlines (Target, JP Morgan, Home Depot, Anthem, etc.), they must defend themselves with vastly smaller IT teams and budgets. SMBs are finding they have a unique set of challenges and vulnerabilities that require a comprehensive but tailored approach to security.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »