The Importance of Cybersecurity Drills

The Importance of Cybersecurity Drills

Time matters when it comes to breach containment. One of the ways to improve your reaction time in the critical 24 hours after a data breach is through cybersecurity drills.

The EU-US Privacy Shield’s Growing Pains

The EU-US Privacy Shield’s Growing Pains

The creation and ultimate effectiveness of the Privacy Shield is a critical element to the future of commercial relationships between the United States and EU.

Business Cloud Apps Not as Secure as Enterprises Believe

Business Cloud Apps Not as Secure as Enterprises Believe

Nearly all business cloud applications lack enterprise-grade security and compliance features. This new report analyzed over 108 million documents and 15,000 cloud apps, providing insights into cloud application use.

Healthcare Providers are Easy Targets for Hackers

Healthcare Providers are Easy Targets for Hackers

The vast majority of hospitals and of other healthcare providers say that security is a key business priority. However, healthcare breach numbers are climbing and the costs associated with these breaches are also trending up.

Office for Civil Rights Plans to Investigate Smaller Healthcare Breaches

Office for Civil Rights Plans to Investigate Smaller Healthcare Breaches

While big breaches grab all the headlines, smaller breaches can cause just as much trouble for those affected.

Balance Prevention with Response in Your Security Spending

Balance Prevention with Response in Your Security Spending

According to the latest research from Gartner, worldwide spending on information security products and services will likely reach $81.6 billion in 2016.

Latest HIPAA Settlements Focus on ePHI Protection

Latest HIPAA Settlements Focus on ePHI Protection

These two new HIPAA settlements are meant to send a strong message about enforcement and accountability. The result for one of those cases was a record-setting settlement of $5.55 million.

Technology Investment: Who Makes the Decisions in Your Company?

Technology Investment: Who Makes the Decisions in Your Company?

What happens when IT purchases are made with the explicit permission of IT but without specific oversight? With proper planning and guidelines, decentralized IT does not need to lead to true Shadow IT.