Law firms subject to same cyber risk as others, but is compliance required?

Law firms subject to same cyber risk as others, but is compliance required?

Law firms are handling some of the most sensitive and private information, this includes but is not limited to healthcare, private business deals, financial assets, mergers and acquisitions, intellectual property, credit cards and so...

01/04/17

2016: A reflection of the year in cybercrime

2016: A reflection of the year in cybercrime

A look back at 2016 predictions in cyber crime and how it all actually played out.

12/02/16

Hillary or Donald: Who is more cybersecurity savvy?

Hillary or Donald: Who is more cybersecurity savvy?

Cybersecurity and the role of the President. What they say is one thing, what about their track record is something else altogether.

11/02/16

IT audits must consider the cyber kill chain and much more!

IT audits must consider the cyber kill chain and much more!

Its not enough to perform an IT audit to achieve compliance alone, Today's threat landscape includes sophisticated APT's, Advanced Persistent Threats, Remote access Trojans and Ransomeware to name a few, In order for an IT audit to...

09/30/16

Florida privacy law adds breach notification and strengthens compliance

Florida privacy law adds breach notification and strengthens compliance

A brief intro to US State and Federal Law and how they work to govern the United States, An intro to the FIPA (Florida Information Protection Act) and how it works with existing compliance to strengthen it and better protect business...

09/02/16

5 more critical IT policies you should have in place

5 more critical IT policies you should have in place

In this article we cover part 2 of 10 IT policies every organization should have.

08/08/16

A pen test a day keeps hackers away

A pen test a day keeps hackers away

Penetration testing has evolved from a nice to have test to a mandatory test, Besides compliance a PEN test will tell you just how secure your organizations data really is. Your network is being scanned and attacked daily, don't wait...

06/29/16

Critical IT policies you should have in place

Critical IT policies you should have in place

When we talk to clients as part of an IT audit we often find that policies are a concern, either the policies are out of date or just not in place at all. This often stems from the fact that no-one has been assigned to a permanent...

05/26/16

Is your healthcare organization leaking data?

Is your healthcare organization leaking data?

Recent news headlines and research has illustrated that healthcare organizations are either leaking data from various servers and medical devices or they are being hit with ransomware. This article looks at some of the reasons why...

04/29/16

Third-party vendors must abide by HIPAA privacy rules as well

Third-party vendors must abide by HIPAA privacy rules as well

This month I cover the HIPAA business associate rule, the FIPA, (Florida Information Protection Act) and summarize the latest FDA cyber security medical device guidance.

03/28/16

Privacy at what cost? Apple vs the US government

Privacy at what cost? Apple vs the US government

The Federal Government, and the FBI need access to the phone as in any shooting to help solve the crime, to look for links to other possible shooters. But Apple CEO Tim Cook says we can’t do that, to do so jeopardizes the technologies...

02/25/16

What every IT department needs to know about IT audits

What every IT department needs to know about IT audits

Today's IT departments are faced with deadlines to deploy and fix an ever increasing array of advanced technology. All of this while trying to maintain some sort of security and compliance posture. Add to this budget cuts and staff...

02/05/16

Preventing data breaches is a business problem not an IT issue

Preventing data breaches is a business problem not an IT issue

One data breach after another, does anyone ask what's the root cause? We have the Verizon data breach investigations report and many more that shed light on the problem and it's that many intrusions are far too easily accomplished....

01/12/16

Load More