Categories
Blog

12 Cyber Security Tips for the New Year

12 Cyber Security Tips for the New Year As we start the new year, we look back on countless examples of large and small companies falling victim to cyber security breaches. While the largest cases (often with tens of millions of stolen records) get the headlines, last year was no different than previous years and […]

Categories
Blog

5 Steps to Find and Eliminate Security Vulnerabilities

5 Steps to Find and Eliminate Security Vulnerabilities It’s unavoidable today. Personal computers, smart phones, tablets, and other network and Internet connected devices run software from multiple sources. That’s great and it makes us pretty happy most of the time. We get great software, communicate fluidly and quickly, and work more efficiently. The problem is […]

Categories
Incident Response

Don’t be the Headline

Don’t be the Next Headline If you’ve ever received a notice from your bank, broker, or health care provider that your information “may have been accessed and they are changing your account number or updating your password”, you know the feeling shared by millions of Americans each year.  If you’ve ever had to write that […]

Categories
Cybersecurity

Price of Stolen Data

What’s my Data Worth? The Ponemon Institute reports that the cost of a single stolen record is over $200 to respond and recover. Fines related to HIPAA violations range from $100 per record to $50,000 per record for repeat offenders. But how much is an individual record worth to the cyber criminal? While the value […]

Categories
Cybersecurity

Partner in Cybersecurity

A Partner for your I/T Team Your information technology team is there for you day in and day out. They keep systems running and occasionally perform miracles to help you meet deadlines. When you ask them if your systems are secure, they give you the best answer they can, “Yes, we’re doing our job.” The […]

Categories
Cybersecurity

Practical Risk Assessment

Practical Risk Assessment Complete your Risk Assessment  HIPAA, PCI, and other commercial and government regulations mandate a risk analysis as an early step in the process of securing electronic data. The National Institute of Standards and Technology provides multiple documents describing recommended approaches to risk assessment. Depending on your industry or regulatory requirements, adherence to […]