Cybersecurity without being an expert

Short on talent? With a current shortage in cybersecurity talent, it may seem challenging to fulfill the needs of your company. However, there are ways to work toward security without being an expert.  Most breaches occur because computer systems are easy to breach...

Overcoming Organizational Roadblocks

Important but not Urgent In many organizations, cyber security is perceived as one of those “important-but-not-urgent” issues that keep getting put off in deference to the pressing issues of the day. It’s not that organizational leaders are doing nothing. In most...

Is your SRA valid?

You have done a risk assessment. That means you should have 1) an SRA report, 2) a risk management plan with prioritized corrective actions, 3) a disaster recovery plan, 4) an emergency response plan, 5) a breach notification plan, 6) current training and in use, 7)...

Ignorance is not Innocence

Cyber security breaches are constantly in the news. Hundreds, if not thousands, occur across every kind of industry each year. Healthcare has consistently been a prime target for cyber criminals to gain access to personal health information (PHI) which can be sold for...

Business Associates bad for business?

In January of 2019, Spiceworks surveyed 600 IT and security decision makers over a wide variety of companies, all with one thing in common: their use of third-party vendors or Business Associates (BAs). Their findings should have everyone looking more closely at their...