Cybercrime is about more than the money now, it’s about attention too. How can we ensure we don’t end up like Game of Thrones? Read to find out.
HITRUST Certification: Increase in HIPAA Breaches Means Brands Need More from Vendors
HITRUST certification can help protect your data at a time when HIPAA breaches are on the rise. Here’s why working with a HITRUST certified vendor makes sense.
IT Challenges Outlined in Vision Solutions’ 10th Annual State of Resilience Report [Research]
What are the challenges IT leaders face in 2017? Research from the Vision Solutions 10th Annual State of Resilience Report outlines major challenges and solutions.
Deloitte Hack Demonstrates the Importance of Two-Factor Authentication
In the wake of the Deloitte email hack–and Equifax’s own recent hacking incident–there’s a clear need for extra security measures, such as two-factor authentication.
How to Rethink PCI DSS Training to Mitigate Breach Costs
Training personnel to be alert for suspicious activity and to follow best practices such as using strong passwords can reduce data breach costs.
How to Protect Yourself in the Wake of the Equifax Breach
Here’s a comprehensive list of what to think about, and what to do in light of the massive Equifax data breach.
The Front Line of Digital Health: What Doctors Think About Technology and Patient Care
We talk about the role of technology in all sorts of situations—how we work, how we communicate, and how we share. What about how we receive health care? Wouldn’t it be interesting if someone asked providers themselves—the actual health care professionals who are the first points of contact for both patients and advancements in health IT—what they think about technology …
Five Reasons You Should Start Using Augmented Reality in Your Business
Get ready for augmented reality for business! It’s here and if you want to know how it can change your business for the good, read on.
Corporate Email and Social Accounts Are Hackers’ Delight [Report]
As the amount of data stored digitally continues to increase exponentially and business organizations depend more and more on digital solutions, IT pros responsible for the protection of that data should be fully aware of the potential threats from hackers, spammers, and phishers.
Dealing with Fragmented Security
Usually, the more complex something is, the more difficult it is to figure out. That goes for cross-word puzzles and mazes—you’d think it would also stand true for cyber security. But what many IT teams have found is that the more complicated our networks are getting—mixing BYOD devices, legacy platforms, as-a-Service apps, and shadow IT—the more challenging it is to …