A look back at cybercrime in 2018

A look back at cybercrime in 2018

Prepare now to mitigate the most cyber risk in 2019!

12/07/18

The IoT tsunami is coming

The IoT tsunami is coming

The Internet of Things will change everything, in all sectors...and you'd better have a plan.

10/17/18

Are you prepared for hurricane season? Disaster recovery and business continuity plan best practices

Are you prepared for hurricane season? Disaster recovery and business continuity plan best practices

Despite the lull of a calm hurricane season so far, your enterprise’s disaster recovery/business continuity plan needs to be in place.

08/16/18

Is your organization a HITRUST org?

Is your organization a HITRUST org?

For good reason, there's now more focus on regulatory compliance for healthcare—which also includes a multitude of vendors and business associates to manage risk for and meet or exceed the Health & Human Services (HHS) compliance...

04/20/18

Automation is the key to mitigation of today’s cyber threats

Automation is the key to mitigation of today’s cyber threats

Organizations need to look at the real risk to its business and its data. When it comes to cybersecurity, one size definitely does not fit all.

02/23/18

Is your cloud service provider ready for HIPAA?

Is your cloud service provider ready for HIPAA?

Is your industry’s compliance with the Health Insurance Portability and Accountability Act of 1996 covered in the cloud?

01/31/18

A look back at cybersecurity in 2017

A look back at cybersecurity in 2017

We keep seeing more and more data breaches. This year Yahoo and Equifax were some of the biggest headline makers, but in the end, it’s more about who has not been breached vs who is the latest.

11/30/17

The security perimeter needs to use one of its most crucial resources: human sensors

The security perimeter needs to use one of its most crucial resources: human sensors

Security Manager George Grachis discusses the current cyber threat landscape and why human sensors, our users, are our most underutilized resource that can make all the difference.

10/25/17

Automating cloud compliance

Automating cloud compliance

The cloud is here, Its dynamic,scalable and ever changing. yesterdays bi yearly or yearly audit snap shots don't meet this new computing platforms needs to achieve compliance. It's time for continuous audits and a single risk...

08/14/17

Your dream job is waiting!

Your dream job is waiting!

I'm a senior Cloud Compliance Architect, but how did I get here? Lots of mountains to climb, education, experience and certifications. I hope to inspire our young people to never give up, keep focused, have a passion for what you do...

06/16/17

Achieving compliance in the cloud

Achieving compliance in the cloud

More and more organizations are moving towards cloud technologies for scalability, cost reduction, and new service offerings. In this short article we will review cloud basics and look at auditing for compliance challenges.

05/15/17

Continuous IT audits are needed to combat today's cyber threats

Continuous IT audits are needed to combat today's cyber threats

It's time to shift to continuous audits as cyber threats are dynamic and constantly changing, we can no longer afford to take a static snapshot of critical IT systems.

03/27/17

HIPAA compliance report card

HIPAA compliance report card

The HIPAA data breaches immediately followed the US government's directive to push healthcare data online as part of the American Recovery and Reinvestment Act Jan 1 2014. HIPAA is a law that is implemented with IT frameworks like...

02/22/17

Make cybersecurity great again!

Make cybersecurity great again!

We are losing the battle of cybersecurity, cyber criminals put 100% into planning and attacks and we cant even fund a cyber security role for all internet-connect businesses!

01/25/17

Law firms subject to same cyber risk as others, but is compliance required?

Law firms subject to same cyber risk as others, but is compliance required?

Law firms are handling some of the most sensitive and private information, this includes but is not limited to healthcare, private business deals, financial assets, mergers and acquisitions, intellectual property, credit cards and so...

01/04/17

2016: A reflection of the year in cybercrime

2016: A reflection of the year in cybercrime

A look back at 2016 predictions in cyber crime and how it all actually played out.

12/02/16

Hillary or Donald: Who is more cybersecurity savvy?

Hillary or Donald: Who is more cybersecurity savvy?

Cybersecurity and the role of the President. What they say is one thing, what about their track record is something else altogether.

11/02/16

IT audits must consider the cyber kill chain and much more!

IT audits must consider the cyber kill chain and much more!

Its not enough to perform an IT audit to achieve compliance alone, Today's threat landscape includes sophisticated APT's, Advanced Persistent Threats, Remote access Trojans and Ransomeware to name a few, In order for an IT audit to...

09/30/16

Florida privacy law adds breach notification and strengthens compliance

Florida privacy law adds breach notification and strengthens compliance

A brief intro to US State and Federal Law and how they work to govern the United States, An intro to the FIPA (Florida Information Protection Act) and how it works with existing compliance to strengthen it and better protect business...

09/02/16

5 more critical IT policies you should have in place

5 more critical IT policies you should have in place

In this article we cover part 2 of 10 IT policies every organization should have.

08/08/16

Load More