Electronic security and cybersecurity cover very different ground, but as technology continues to evolve these teams are starting to work together. Here’s how.
The number of data breaches increases exponentially every year. Here’s what you need to know to prevent and mitigate a breach.
What are the top must-attend events for CIOS and tech leaders in 2018? Learn which ones you don’t want to miss.
Blockchain technology holds great potential for healthcare and other industries that need high security.
The Ponemon Study: Data Risk in the Third-Party Ecosystem reveals a profound lack of confidence in third-party suppliers, security policies, and procedures.
With the growth of cybercrime, what are the real costs to your business of security breaches and maintaining compliance?
Recent changes to the PCI DSS have imposed new rules on smaller online merchants and added to those required of larger vendors. Find out how you may be affected and how compliant hosting can help.
It was estimated that 4,000 daily ransomware attacks occurred in 2016, according to the U.S. Government Interagency Guidance Document, “How to Protect Your Networks from Ransomware.” That’s a 300 percent increase over the 1,000 daily ransomware attacks reported in 2015. As a result, covered entities (CEs) and business associates (BAs) are wondering whether ransomware attacks on private health information (PHI) …
According to Gartner predictions for 2017, nearly a third of IT spending will happen in other departments; the perception is that IT is too slow and unwieldy, so operations outsources their IT needs. IT management requires a proactive, business-centric approach to work towards mutual company goals and create efficiency. “You need to be clear on what the strategy is, be …
Safeguarding protected health information is becoming more challenging every day—especially for companies operating in healthcare verticals who don’t always understand that compliance issues apply to them. Yet, under the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule, companies operating in a variety of healthcare verticals are categorized collectively as “Business Associates” (BAs) and, as such, are required …
- Page 1 of 2