Adopt v. Comply: The Difference Between Frameworks and Regulations
Josh Mayfield
Adopt v. Comply: The Difference Between Frameworks and Regulations

Recent headlines would lead any rational person to conclude that topics like data security, data privacy, data breach, and ransomware would outrank seemingly solved problems, like compliance. But Google Analytics reveals that, in spite of the bleeding headlines, searches for IT compliance far outnumber the queries for more exciting noun phrases. The statistician, Seth Stephens-Davidowitz has said, “Sometimes, statistical analysis is tricky. But other times, a finding just jumps...

READ MORE
HIPAA Security Rule: Protecting Privacy and Improving Patient Care
Josh Mayfield
HIPAA Security Rule: Protecting Privacy and Improving Patient Care

In my previous post, we looked at the HIPAA Privacy Rule which mandates data protection of health information as a civil right. Boiling the rule down to its simplest form, HIPAA Privacy lays out what data requires protection and who is held accountable for keeping it confidential. However, it’s the HIPAA Security Rule that tells us how that data must be protected. Three Security Safeguard Categories The Security Rule...

READ MORE
How the Cook County Sheriff Lights Up Dark Endpoints
Juanma Rodriguez
How the Cook County Sheriff Lights Up Dark Endpoints

Every business is a data business, and law enforcement is no exception. Law enforcement organizations hold confidential information that cyber criminals consider valuable. Attack methods and goals vary of course, from hackers breaking in via a supplier to swipe personnel data, as was the case in one incident that targeted U.S. law enforcement agencies earlier this year, to hacking police bodycams to alter footage. More common – and equally...

READ MORE