Cybersecurity without being an expert

Short on talent? With a current shortage in cybersecurity talent, it may seem challenging to fulfill the needs of your company. However, there are ways to work toward security without being an expert.  Most breaches occur because computer systems are easy to breach...

Is your SRA valid?

You have done a risk assessment. That means you should have 1) an SRA report, 2) a risk management plan with prioritized corrective actions, 3) a disaster recovery plan, 4) an emergency response plan, 5) a breach notification plan, 6) current training and in use, 7)...

Ignorance is not Innocence

Cyber security breaches are constantly in the news. Hundreds, if not thousands, occur across every kind of industry each year. Healthcare has consistently been a prime target for cyber criminals to gain access to personal health information (PHI) which can be sold for...

Business Associates bad for business?

In January of 2019, Spiceworks surveyed 600 IT and security decision makers over a wide variety of companies, all with one thing in common: their use of third-party vendors or Business Associates (BAs). Their findings should have everyone looking more closely at their...

Security Starts with Knowing your Weakness

One of the biggest challenges in data and information security is knowing your threat level. IBM security recently released their 2018 X-Force Threat Intelligence Index. They monitor daily security events in 130 countries throughout the year for a comprehensive...