You need a team to choose and manage an IDS/IPS. Whether it’s the responsibility of your IT Security Team,Data Loss Prevention Team, a managed service provider, or a designated co-managed team consisting of security-related department heads.
More recently, password length, in the form of longer, memorable word strings have proven to be a more important security practice than the use of shorter complex passwords.
Monitoring audit logs for all critical systems and devices in your environment is key to understanding what types of events and actions occur on a daily basis, allowing you to establish a baseline of what is considered normal system activity.
Remote access to tools and data is essential to employees who work from home or are unable to go into the office for health or other logistical reasons.
Healthcare organizations of all sizes use firewalls to protect the perimeter of their sensitive networks. Here are some firewall best practices to get you started.
Whenever a system is configured make sure you know exactly what is running and also what is necessary to allow the system to perform its intended function.
Most people know how to destroy physical sensitive data, but when it comes to securely destroying electronic data, most healthcare professionals don’t know where to begin.
You should implement encryption to protect PHI any time it is stored.
While every organization is different, the end goal of practicing good cyber hygiene is to identify vulnerabilities, minimize risk exposure, and reduce the potential for a breach.
Fully understanding all the PHI you have, where it is stored, what processes touch it, and how it is used in your organization is critical to enabling a business to properly handle and secure PHI.
Yet a complete and thorough risk analysis is one of the best ways for you and your organization to make intelligent and informed business decisions
The SAQ A-EP PCI assessment is for merchants who have an e-commerce card data flow that is not entirely outsourced to a PCI validated third-party service provider.
HIPAA laws and cybersecurity are not simple. The 2023 HIPAA Guide breaks down HIPAA guidelines into actionable steps and easy-to-understand information so that your healthcare staff can be fully educated on data privacy and protection.
If you have a knack for solving problems, good organizational skills, and attention to detail, cybersecurity might be a good fit for you.
One of the easiest ways to make cybersecurity training more interesting is by making it fun. Here are five tips for making workforce security training fun and memorable.
This blog explains how to do a quick risk assessment on an app in the app store or one that you’ve downloaded on your phone to determine if an app is secure.
This blog will discuss changes made to the SAQ P2PE version 4.0 and will review the process of performing a self-assessment using the SAQ P2PE.
What should you look for in a PCI program and how will you know which PCI program is right for you?
Firewalls 101 - What is a Firewall? Tune in this week as Noah Pack and Kaden Payne give you the basics on all things firewalls .
The vast field of Cybersecurity can be very intimidating for a newcomer. Tune in this week as Noah Pack gives the best sites to learn cybersecurity and tools to get you building your skills in infosec.
This blog will discuss changes to the PCI DSS 4.0 SAQ questionnaires and is based on our Webinar "PCI DSS 4.0: What's New and How It Affects You."
Tune in this week as Heff and Jared give you the latest in this week's cyber news! rising vishing scams, Apple malware and more!
The vast field of InfoSec can be very intimidating for a newcomer wanting to get into the trade. Tune in this week as Noah Pack gives his top 3 recommended projects to get your foot into cybersecurity.
TikTok, T-Mobile breach settlement, Discord hacking, Uber breach and more!