Here’s a look at what characteristics differentiate the strongest cybersecurity programs from the rest and what they mean for all industries in general,
Why Harassment Prevention Training Should Be A Top Priority for All Employees
Learn why companies should make harassment prevention training a top priority for all employees in order to create a positive and healthy work environment.
How Ransomware Works
Cybersecurity is a top concern for most businesses—reports of cyber attacks and data breaches are commonplace in today’s news headlines. One of the most important threats to pay attention to is ransomware. This is a kind of malicious software that threatens to block you from accessing your own files—or even your entire computer or network—until you pay a specified dollar …
Calculating the Return on Security Awareness Training: What You Need to Know
Pitching your finance and executive teams on security awareness measures is no easy task. Here’s how to discuss return on security investment, security awareness and training.
What the Ponemon Authentication Report Discovered About Password Practices in the Workplace
With data from 1,761 IT and IT security professionals, the Ponemon Authentication Report’s provides information on password and privacy best practices you can incorporate in the workplace.
IT Challenges Outlined in Vision Solutions’ 10th Annual State of Resilience Report [Research]
What are the challenges IT leaders face in 2017? Research from the Vision Solutions 10th Annual State of Resilience Report outlines major challenges and solutions.
HIPAA Guidelines: Understanding Compliance in the Cloud
Learn about the HIPAA guidelines and gain a better understanding of how you and your IT provider play a part in cloud compliance. The international healthcare cloud computing market is projected to rise to a valuation of nearly $9.5 billion in 2020—an annual growth rate of 20.5%. For organizations that manage, store or transmit electronic protected health information (ePHI) and …
Choosing a Colocation Facility: Know Your ABCs
You may be considering a change in IT operations to move from in-house to a colocation facility—a solution that allows you to move your servers and network to a purpose-built, offsite location for housing and ongoing improvement. This is often the case when the benefit of moving your servers outweighs the advantages of running when onsite. Cost savings, resiliency, and efficiency are …
Why Backup is Not Disaster Recovery
We often read the phrase “Backup and Disaster Recovery” as if the two things were inexorably linked. In a way, they are. But backup is not disaster recovery. And, while you can’t have disaster recovery (DR) without having backups—you can back up your data without having a DR plan in place. Although it might seem cheaper and easier, it’s is …
HIPAA Security and Awareness Training: An Integral Part of the Compliance Strategy
When it comes to implementing a robust security protocol, employee training is one of the most critical—and often overlooked—aspects of a solid plan. Security and awareness training is also an integral part of HIPAA compliance. But, according to a recent HealthITSecurity.com review of NueMD’s 2016 HIPAA Survey Update: “Healthcare organizations are also falling behind on annual HIPAA training. Currently, 58 …