Traveling Tips for Data Protection
Data protection should not take a back seat while traveling. Following these tips can help mitigate the risk of a cybercrime interrupting a silent night this holiday season! Data Protection …
A lack of proper security could be making you a target for cyber attacks – assess your security posture and mitigate any gaps that might be putting your data at risk.
Data protection should not take a back seat while traveling. Following these tips can help mitigate the risk of a cybercrime interrupting a silent night this holiday season! Data Protection …
On August 22, Carnegie Mellon University’s Software Engineering Institute (SEI) hosted a webcast with Dan Costa: Institutionalizing the Fundamentals of Insider Risk Management. The discussion focused on the practicalities of …
Businesses must face the data security implications of the interconnected Internet of Things (IoT) devices they use. How can organizations protect these endpoints? IoT Devices as Endpoints IoT devices form …
Endpoint Security has always been important, yet the recent boom of Artificial Intelligence (AI) in the cultural zeitgeist raises questions as to how organizations can protect themselves from attacks. AI …
No business owner wants to discover that their organization has suffered a supply chain attack. These cyber attacks target organizations by compromising weak links in the supply chain. These chains …
Two-Person Integrity (TPI) is a security control mechanism that is leveraged to protect integral data or functions that have a high level of risk. Other terms for TPI include Two …
When it comes to maintaining a strong defensive posture, Multi-Factor Authentication (MFA) is an effective tool in stopping a lion’s share of automated attacks. By utilizing two or more authentication …
In the 21st Century, when international conflict is discussed, the topic of cyber warfare often comes up. Cybersecurity threats such as widespread data theft, ransomware attacks, and espionage can all …
As remote work and hybrid work have risen in prominence, so has the concept of Zero Trust. In a world where perimeters have expanded with the integration of IoT machines …
Medical Data Security is important for patients, medical professionals, and employees of healthcare organizations. To adequately secure patients’ electronic Protected Health Information (ePHI), all healthcare organizations and auxiliary offices must …
For businesses, the holidays offer an important high point in revenue and customer engagement. Charities and nonprofits experience increased giving, often facilitated by a number of annual drives and events. …
For many industries, work travel is a fact of life, and thus questions of data security and mobile device management arise often. When employees travel, an organization’s attack surface expands, …
Across the globe, many employees still Work From Home (WFH), and by some estimates 25% of all professional jobs will be remote work by 2023. As the visibility of remote …
If a laptop is stolen, having a drive that is secure and encrypted can be the difference between a cybersecurity incident and a catastrophe. BitLocker is one tool Microsoft provides …
Spring is in the air! It’s time to open the windows and let warm breezes freshen up homes that have been battened down for winter. Spring is always a good …
At its core, cybersecurity is a game of defense. Criminals are continually probing organizations’ systems, software, and strategies, seeking vulnerabilities to exploit for technological and monetary gain. IT and cybersecurity …
Every day, millions of people across the world seek some form of healthcare. In the vast majority of cases, there is documentation in the patient’s medical file to help the …
“A chain is only as strong as its weakest link” is a common aphorism, and it holds true in the realm of data protection. Any company’s security posture could be …
The widespread use of mobile computers and communication devices has bred efficiency and convenience into many parts of the modern office. Email and instant messaging are used to arrange meetings, …
March 2020 was a big month for the global healthcare system. In the blink of an eye, almost everything had to change, and medical offices across the country were forced …