default-logo
15
NOV
2017
4 steps you can take to safeguard protected health information

4 Steps You Can Take to Safeguard Protected Health Information

The digitization of medical care has become a double-edged sword. Healthcare providers like Kaiser Permanente have used medical records to improve the health of their members. In 2015, the National Committee for Quality Assurance found that Kaiser Permanente ranked first in 21...
02
MAR
2017
imac laptop

How to Identify and Prevent Insider Data Breaches

A little known fact about corporate identity theft is that a large percentage of data breaches originate inside the organization’s walls. A recent report by Intel estimates that 43% of data breaches are the result of insider threats. Half of the insider breaches came from...
01
MAR
2017

Speed: The Crucial Element in Data Breach Detection and Response

If you think you’re immune from hackers, consider this USA Today headline from March 25, 2016: 1.5M Customers of Verizon Anti-Hacking Unit Hacked. We bring this headline to your attention not to cast aspersions on Verizon, but to illustrate that no organization is immune from...