default-logo
15
NOV
2017

5 Ways to Better Secure Your Employees’ Passwords

Posted By :
Comments : 0
As providers of comprehensive cybersecurity solutions, we’re often asked how an organization can better ensure that their employees are being safe online. There are numerous ways to prevent a data breach, from the implementation of a threat intelligence tool to network security protocols that screen your supply chain. However, if you’re not educating your employees on the importance of cyber safety, then you’re leaving the back door wide open for hackers. Employee data may pose the highest risk for organizations, so it’s important to make sure there are security protocols in place, that employees stay alert to any potential scams and that everyone is prepared in the event that a data breach does occur. All of this starts with a safe password. The Basics of Password Security Here are...
Read More
4 steps you can take to safeguard protected health information
15
NOV
2017

4 Steps You Can Take to Safeguard Protected Health Information

Posted By :
Comments : 0
The digitization of medical care has become a double-edged sword. Healthcare providers like Kaiser Permanente have used medical records to improve the health of their members. In 2015, the National Committee for Quality Assurance found that Kaiser Permanente ranked first in 21 different healthcare quality measures, more than any other health plan in the country. Kaiser’s quality of care is due in no small part to its sophisticated medical records system. On the other hand, the 2015 hack of the largest health insurance company in the U.S. conveys the risks associated with the digitization of healthcare. The February 2015 Anthem hack affected up to 80 million people and may have been going on for as long as ten months.   Although Anthem says no medical information was compromised,...
Read More
stolen email credentials and passwords
03
MAR
2017

It’s Time to Take Stolen Email Credentials Seriously!

Posted By :
Comments : 0
Are you concerned about hackers stealing your organization’s email credentials and accessing your organizations PII or confidential information? If you’re not, you should be. Even Mark Zuckerberg of Facebook fame isn’t immune from hackers. Yes, that’s right. Despite having billions of dollars and some of the best technology minds on the planet at his disposal, Mark Zuckerberg’s social media accounts were hacked. If Mark Zuckerberg isn’t safe, you can bet that your organization most certainly isn’t as well.
Read More
imac laptop
02
MAR
2017

How to Identify and Prevent Insider Data Breaches

Posted By :
Comments : 0
A little known fact about corporate identity theft is that a large percentage of data breaches originate inside the organization’s walls. A recent report by Intel estimates that 43% of data breaches are the result of insider threats. Half of the insider breaches came from employee negligence and half came from malicious actions.
Read More
12