Business Continuity

Business Continuity news, information, and how-to advice

google map location pin
apple pay

medical records healthcare medicine file document claim form doctors office hospital 000000399129

Anthem: 78.8 million affected, FBI close to naming suspect

On Tuesday, Anthem, the nation's second largest health insurer, said that 8.8 to 18.8 million people who were not customers could be impacted by their recent data breach, which at last count is presumed to affect some 78.8 million...

cso50

Security offers a marketing advantage for ADP

ADP's award-winning payroll vendor management system helps the company serve more international markets and clients than ever before and is, in fact, doing it so well that its managers are routinely asked to sit in on sales meetings...

If you could go back in time...

Turning back the clockImage by ShutterstockEvery week brings news of breaches, cybercrime and state-sponsored hacks, each more shocking than the last.Unfortunately, it's not practical to rip up the whole Internet and start over again...

disaster recovery button keyboard

When backup Is a disaster

Utility Company AMP overhauls a mishmash of backup and recovery procedures to create one coherent plan.

heatlhcare doctor

After the Anthem breach: How we can help secure health data

The Anthem breach may have seemed a baffling or inexcusable security lapse. But once you understand what’s going on in healthcare security and technology right now, you can see why this was inevitable and how we can help prevent such...

Lenovo Y50 gaming laptop

Lenovo says Superfish problems are theoretical, but that simply isn't the case

On Thursday, the world woke to the news that commercial-grade Lenovo PCs were being shipped from the factory with adware pre-installed on the system. Designed to provide a visual shopping experience, the software is insecure and...

Lenovo Y40 Gaming PC

FAQ: How to find and remove Superfish from your Lenovo laptop

Lenovo has shipped consumer PCs with software designed to offer a visual shopping experience, but in reality it's adware that breaks HTTPS online – leaving customers vulnerable to attack and information theft. Here’s how to determine...

intro

10 obscure technologies that could change the world

Technology breakthroughs that many people don't even know exist.

jaguar land rover

Senators to push privacy, security legislation for IoT

Some Democratic senators want new laws that mandate security and privacy measures on the Internet of Things, as concern grows over personal data collected by connected devices.

insurance dictionary

CISOs cut out of cyber-insurance decision making, study suggests

Most large enterprises in the UK still aren't managing risk through dedicated cyber-insurance policies and the few that do buy based on recommendations by legal rather than IT departments, an analysis by non-profit the Corporate...

anthem insurance

Anthem: How does a breach like this happen?

Remove all the hype, all the sensationalism, and Anthem's security dilemma is no different from one that any other large organization would face. Was this attack truly sophisticated, or could anyone have pulled it off?

medical stethoscope 101922589

Hackers target health care as industry goes digital

With more health providers and insurers incorporating IT into clinical care, hackers are viewing the health care industry as their next target.

amy pascal

The conversation security leaders need to have about Amy Pascal’s departure

Three questions security leaders need to ask the executives and board in the wake of Amy Pascal’s departure

01 checklist

7 critical things to cover in your disaster-recovery plan

As always, you never know when a disaster will strike, so better to have a checklist on hand so that panic doesn’t set in when the network goes down.

medical records healthcare medicine file document claim form doctors office hospital 000000399129

Anthem confirms data breach, but full extent remains unknown

Anthem, the nation's second largest health insurance provider, confirmed that outsiders were able to compromise an unknown number of records, including complete profiles for individuals.

data protection

How to create an effective data security communication plan

There is a need to create value around company data and one way to do this is to ensure that the workforce knows and understands the threats that are out there and the measures that are in place to protect against them.

serverskulls header

Criminals holding compromised websites for ransom

According to a report form High-Tech Bridge, criminals have started moving away from Ransomware, which targets a single PC, to a process the security firm is calling RansomWeb – where the criminal encrypts the website's databases and...

keyboard chinese flag china hacker

Businesses warned about new espionage campaigns from of China

Ongoing investigations by the FBI have revealed a group that has been compromising personal and sensitive business information from U.S. commercial and government networks in recent weeks.

Load More