Every business in the healthcare industry likely has many mobile devices, laptops, tablets and other moving pieces with patient and employee data easily accessible on it. On HealthIT Security, Bill Kleyman wrote that this demands organizations to take a closer look at data security across their company, as trends like BYOD (Bring your own Device) and the consumerization of IT means there are more inherent risks to doing standard business.
Read MoreThere are a lot of risks carried when adopting cloud computing. Like any other new technology, companies have been trying to work out the kinks of the cloud as far as security is concerned.
Read MoreRemote management and monitoring (RMM) vendors often offer an integrated security solution with their core product. But how does the security offered by these integrated options compare? Below are the questions to ask your RMM vendor to make sure you get the full picture of the security being offered. 1. Is the security solution included…
Read MoreMany Internet browsers were saddened earlier this month when they found out Google was going to completely shut down its Reader service. Initially, The Los Angeles Times said the closing was due to low usage, but a report by AllThingsD shows that the company killed it because they didn’t want to have to keep updating the privacy laws of the program.
Read MoreMoving into the future of data security will be something every business needs to undertake in the near future, if not immediately.
Read MoreSo far in this series, we have shared tips for securing access to your AWS resources, hardening your system and protecting with a firewall and IPS combination. At this point, your applications running on Amazon Web Services are resilient to attack, but it is critical that ongoing monitoring be a part of your overall security strategy. Monitoring…
Read MoreThe amount of hype around big data in the technology world is enormous, but not many truly know what the technology is. Ashwin Pal wrote on CSO Online that people are still not clear as to what constitutes as this kind of information even though it could have data security implications.
Read MoreAs the need for data security has grown across enterprises, so too have the number of tools and measurements being used to help companies manage their risk and network safe
Read MoreBy Vic Hargrave The healthcare industry has certainly felt the affects of the Bring Your Own Device (BYOD) trend. More often than not doctors, nurses, and other clinical support staff carry mobile smartphones and tablets. According to the article The Usage of Tablets in the Healthcare Industry, doctors and nurses were some of the early adopters…
Read MoreThis year, tax day falls on April 15. It’s coming mighty quick, so those that have waited until the last minute could be in line for quite the scramble once they start doing their taxes. With the amount of online services, it may seem easy to do taxes online in a care free manner, but Pedro Hernandez wrote on Small Business Computing that companies and people alike need to keep data security in mind when preparing taxes.
Read More