How to Succeed in the Digital Healthcare Frontier
Josh Mayfield
How to Succeed in the Digital Healthcare Frontier

Healthcare is data. To effectively treat patients and create new forms of care, information must be shared, analyzed, and transmitted across several devices, among a number of healthcare professionals, insurance providers and other third parties. The sensitive nature of this personal information has long made healthcare an attractive target to cyber criminals while the complex nature of the industry creates continued struggles to protect the data, as frequent data...

READ MORE
3 Cybersecurity Tips for Summer Travel
Jo-Ann Smith
3 Cybersecurity Tips for Summer Travel

Just because you might be taking a vacation this summer doesn’t mean cyber thieves will do the same. As you and your company’s users prepare to close out your summer travel – for leisure or for work – it’s important to take a few simple precautions that will go a long way in the protection of your data, and your employers. Remember, the hospitality industry is a popular target...

READ MORE
NIST Cybersecurity Framework: Fourth, Adopt a Bias to Action
Josh Mayfield
NIST Cybersecurity Framework: Fourth, Adopt a Bias to Action

In my previous posts, we explored how to identify, protect and implement detection measures established in the NIST Cybersecurity Framework (CSF). Throughout this series, we’ve been noting how any IT and IT security team can implement the NIST CSF with deliberate and tangible steps that improve their security posture. The framework consists of what I call ‘pillars’ and this installment is about the fourth pillar: Respond. Once the first three...

READ MORE