View Post

Sharing: The #1 Reason Your Company Security Will Be Breached

In Security by Shelly KramerLeave a Comment

Many companies are headed to the cloud these days looking for new and better ways to collaborate, store, and share information. Is yours? Whether you’re going the public, private, or hybrid route, moving to the cloud is a very popular decision—in fact, you’ll find 93 percent of companies share your strategy. Of course you didn’t adopt cloud because you wanted …

View Post

Cybersecurity Risks and the Healthcare System [Report]

In Security by Shelly KramerLeave a Comment

When you think about online security, it’s a fair bet that the protection of your health records will be near the top of the list of the personal data that you value the most. Well, surprise: According to a new benchmark report, your personal health information would appear to be less well protected than you might imagine. The Insights Industry …

View Post

Dell Report Reveals Iranian Hackers Used LinkedIn to Spy

In Security by Shelly KramerLeave a Comment

How often have you gotten a social media connection request from a person you didn’t know well, or perhaps even at all? Did you reject it immediately, accept, or do a little research first? Many people skim the profiles of potential connections to determine the validity of an unknown request—that is, the perceived validity. What if those seemingly random requesters …

Is The C-Suite Guilty of Ignoring IT Security and its Associated Risks?

In Security by Daniel NewmanLeave a Comment

Last year, Target’s CEO stepped down after one of the worst cyber-attacks we’ve seen yet. In the massive data breach, debit and credit card details of a staggering 100-plus million customers were stolen. Unfortunately, Target is not alone. More than 90 percent of Fortune 500 companies have been victims of cybercrimes, and cases of security leaks and hacks hit the …

10 questions to ask to ensure your cloud services provider is HIPAA compliant

In Security by Shelly Kramer1 Comment

More companies are looking to the cloud for business and data storage solutions, especially those in the healthcare space. If your business must be HIPAA compliant, these 10 questions to ensure HIPAA compliance might save you some major headaches down the road. HIPAA, the Health Insurance Portability and Accountability Act, is one way that security and privacy is regulated. It was …

View Post

Five IT Security Claims You Can Quit Believing

In Security by Shelly KramerLeave a Comment

According to the latest annual PwC survey of the Global State of Information Security, the number of cyber security incidents detected is rising sharply, while the amount spent on security has been falling. Given the extremely high cost of a cyberattack to a businesses’ reputation and day-to-day operations, it’s a bit of an understatement to say this might be considered …

View Post

How to Master HIPAA Compliance and Security in the Cloud

In Security by Shelly Kramer1 Comment

In a world of tight healthcare budgets and increasing pressure to implement new technology, many healthcare CIOs are looking to the cloud for solutions. The flexibility and potential cost savings that cloud services can offer are obvious benefits to healthcare executives facing ever-higher costs to collect, collate, and store vast amounts of digital data. But, we’re talking healthcare here. The …

Enterprise IT Reality: Cyberthreats and Security Fears

In Security by Shelly KramerLeave a Comment

Today’s enterprise IT teams are largely kept awake at night focused on cyberthreats and security fears. That’s very different, though, than what tech teams have focused on in the past. Consider this: In November 1988, the world was introduced to the first widespread computer bug. The virus caused thousands of machines to crash and resulted in damage that was well …

View Post

Four Steps to Protecting Your Utility Management System from Hackers

In Security by Shelly Kramer1 Comment

Every day it seems as though there’s another hacking story in the news, the most recent of which is yet another hacking by the Chinese of the federal government’s databases, this time gaining access to personal information on some four million current and former federal employees. Troubling, to be sure. More troubling if you happen to be an IT pro …