The Verizon Data Breach Investigations Report makes it clear that each organization needs to implement a multi-faceted security solution to address the range of potential threats. Verizon points out that a one-size-fits-all security package is not a solution. Each organization has unique challenges based on type and size of company, processes and procedures, budget, and other […]
Challenges for the Future of Healthcare Networks
Medical facilities face the challenge of upgrading their healthcare networks and providing comprehensive support for the growing demands of digitized information according to a recent report by HIMSS Analytics. In a recent study, “Healthcare Provider Network Solutions, Barriers and Challenges” HIMSS reports that “As health care organizations implement information technology solutions including components of the […]
Cybertheft of Intellectual Property
In a report on Intellectual Property (IP), CSO suggested that cybertheft is a serious threat for businesses around the world. They wrote, The next big target for cyber-criminals, state governments, organized crime and hackers is IP. One stolen manufacturing process can be worth millions in saved development costs or billions in market share. Estimates show […]
The Challenge of Guarding Ideas
The challenge of keeping valuable secrets confidential is often held in tension with the challenge of being a robust company with opportunity to discover and grow. Some companies lock-down information so tightly it can inhibit workflow, cause unnecessary duplication, and even generate a culture of suspicion. Other businesses may err the other way and lose valuable information that can hurt […]
Protecting Against Insider Threats to Your Organization
How do you guard against employee theft of data without creating an environment of suspicion? By developing and administering an internal security policy, you can keep internal security at a professional level. Here are a few highlights in beginning to consider a plan: Understanding Your Data Monitoring Network Activity Utilizing Data Protection Tools for Various […]
Healthcare CIOs Focused on EHR and Infrastructure
One of the primary technology challenges for healthcare facilities is EHR implementation. According to a study by Level 3 Communications, CIOs are focused on meeting the impending federal deadlines.[1] Over half of those surveyed believe that EHR implementation and Meaningful Compliance will improve overall patient care. In addition to meeting EHR deadlines, healthcare facilities are […]
10 Ways to Improve Network Security
The New York Times reported recently on a Computer Security Institute survey of 443 companies and government agencies. They found that 64 percent reported malware infections and the “financial loss from security breaches was $234,000 on average for each organization.” Here are ten ways to improve network security based on the New York Times article. […]
Ransomware: What You Need to Know (Part 1)
What is Ransomware? Ransomware is malware that enables cyber extortion for financial gain. Criminals can hide links to ransomware in seemingly normal emails or web pages. Once ransomware infects a user’s system, it either encrypts critical files or locks a user out of their computer. It then displays a ransom message that demands virtual currency […]
Ransomware: What You Need to Know (Part 2)
How does it spread? Ransomware has been shown to spread in four different ways: As an email sent to company addresses pretending to be from customer support from FedEx, UPS, DHL, Outback Steakhouse, etc. The trojan is attached to the email, usually labeled as a tracking number In PDF documents that are attached to emails, […]
Ransomware: What You Need to Know (Part 3)
Best Practices to Combat Ransomware Take a layered approach to security A firewall and Antivirus combination are not enough to secure an environment against ransomware. Layers of protection are an important and in-depth part of your defense. Manage network traffic Proper management of network traffic leads to better control of what traffic is on the […]