Your Vendors and Data Security
“A chain is only as strong as its weakest link” is a common aphorism, and it holds true in the realm of data protection. Any company’s security posture could be …
A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment. Other terms for this phenomenon include unintentional information disclosure, data leak and also data spill. DriveStrike remote wipe is data breach protection!
“A chain is only as strong as its weakest link” is a common aphorism, and it holds true in the realm of data protection. Any company’s security posture could be …
March 2020 was a big month for the global healthcare system. In the blink of an eye, almost everything had to change, and medical offices across the country were forced …
Data breaches are a costly reality in a modern world where so much information is stored digitally. Any time data is accessed by an individual or group that does not …
Bring Your Own Device (BYOD) programs are increasingly common across every sector of the workforce. A BYOD policy can be quite useful, as it saves the company the cost of …
Recent large security incidents like the Microsoft Outlook breach and the SolarWinds hack are putting cybersecurity in the public eye and prompting government intervention. Highly funded and persistent threat actors …
GDPR compliance, data privacy, data security, HIPAA, privacy policy, cookie policy, SOX, data breach protection, the list goes on and on. If you use the internet you can’t escape the …
As you probably already know, the 2003 Health Insurance Portability and Accountability Act (HIPAA) Security Rule requires healthcare organizations to safeguard electronic protected health information (ePHI). And, if you own, …
The DriveStrike team recommends implementing and enforcing mobile device management best practices and policies. Companies with employees, contractors, or vendors who access company data using any mobile computing device are …
A data breach is any incident where sensitive, confidential or otherwise protected data is accessed or disclosed by unauthorized persons or means. Data breaches often involve personal health information (PHI), …