Posts by Josh Mayfield

Josh Mayfield
Josh is Absolute’s Director of Security Strategy and works with Absolute customers to leverage technology for stronger cybersecurity, continuous compliance, and reduced risk on the attack surface. He has spent years in cybersecurity with special focus on network security, threat hunting, identity management, and endpoint security. His research has been featured in leading security publications including, SC Magazine, Infosec, Dark Reading, and he is often cited by business and tech journalists for his analysis of cryptocurrencies, security operations, and attacker psychology.
How HITRUST Can Help You
Josh Mayfield
How HITRUST Can Help You

According to a new study conducted by researchers at Massachusetts General Hospital and published in the Journal of the American Medical Association, the number of annual health data breaches increased 70% over the past seven years. That same study noted that 75% of the 132 million breached, lost, or stolen records were a result of a ‘hacking or IT incident.’ There’s no question healthcare organizations are under siege by...

READ MORE
Adopt v. Comply: The Difference Between Frameworks and Regulations
Josh Mayfield
Adopt v. Comply: The Difference Between Frameworks and Regulations

Recent headlines would lead any rational person to conclude that topics like data security, data privacy, data breach, and ransomware would outrank seemingly solved problems, like compliance. But Google Analytics reveals that, in spite of the bleeding headlines, searches for IT compliance far outnumber the queries for more exciting noun phrases. The statistician, Seth Stephens-Davidowitz has said, “Sometimes, statistical analysis is tricky. But other times, a finding just jumps...

READ MORE
HIPAA Security Rule: Protecting Privacy and Improving Patient Care
Josh Mayfield
HIPAA Security Rule: Protecting Privacy and Improving Patient Care

In my previous post, we looked at the HIPAA Privacy Rule which mandates data protection of health information as a civil right. Boiling the rule down to its simplest form, HIPAA Privacy lays out what data requires protection and who is held accountable for keeping it confidential. However, it’s the HIPAA Security Rule that tells us how that data must be protected. Three Security Safeguard Categories The Security Rule...

READ MORE
HIPAA Privacy is About More Than Just Compliance
Josh Mayfield
HIPAA Privacy is About More Than Just Compliance

Nearly every healthcare IT professional I’ve spoken to is seriously overburdened when it comes to protecting patient privacy. From annual security assessments to following breach protocols and everything in between, maintaining HIPAA compliance requires more than most IT departments are resourced to handle. Top of mind for most healthcare administrators however is the reality of non-compliance. HIPAA violations vary widely in both cost and root cause. In 2017 for...

READ MORE
Forecasting Intelligence: Transforming IT Asset Management Into Business-Critical Insights
Josh Mayfield
Forecasting Intelligence: Transforming IT Asset Management Into Business-Critical Insights

There is a growing opportunity for IT teams to improve the standing of their IT asset management (ITAM) programs. If done properly, ITAM is really the beginning of any evidence-based decision process. “That which is asserted without evidence, may be dismissed without evidence.” – Christopher Hitchens Interestingly, within all other aspects of life, we recognize that evidence is often needed to make a compelling argument stick. Every single metric tracked...

READ MORE