12 Cyber Security Tips for the New Year As we start the new year, we look back on countless examples of large and small companies falling victim to cyber security breaches. While the largest cases (often with tens of millions of stolen records) get the headlines, last year was no different than previous years and […]
Author: Dennis
5 Steps to Find and Eliminate Security Vulnerabilities It’s unavoidable today. Personal computers, smart phones, tablets, and other network and Internet connected devices run software from multiple sources. That’s great and it makes us pretty happy most of the time. We get great software, communicate fluidly and quickly, and work more efficiently. The problem is […]
Don’t be the Headline
Don’t be the Next Headline If you’ve ever received a notice from your bank, broker, or health care provider that your information “may have been accessed and they are changing your account number or updating your password”, you know the feeling shared by millions of Americans each year. If you’ve ever had to write that […]
Price of Stolen Data
What’s my Data Worth? The Ponemon Institute reports that the cost of a single stolen record is over $200 to respond and recover. Fines related to HIPAA violations range from $100 per record to $50,000 per record for repeat offenders. But how much is an individual record worth to the cyber criminal? While the value […]
Partner in Cybersecurity
A Partner for your I/T Team Your information technology team is there for you day in and day out. They keep systems running and occasionally perform miracles to help you meet deadlines. When you ask them if your systems are secure, they give you the best answer they can, “Yes, we’re doing our job.” The […]
Practical Risk Assessment
Practical Risk Assessment Complete your Risk Assessment HIPAA, PCI, and other commercial and government regulations mandate a risk analysis as an early step in the process of securing electronic data. The National Institute of Standards and Technology provides multiple documents describing recommended approaches to risk assessment. Depending on your industry or regulatory requirements, adherence to […]