FBI Censors Released Documents
Posted January 10, 2017 in Data Breach, Digital Forensics, Compliance
You may recall the tiff between Apple and the FBI following the shooting that took place on December 2, 2015 in San...
Did Russia Invade Vermont?
Posted January 10, 2017 in Malware, Data Breach, Cloud Security
One way investigators have of identifying the source of computer hacks is by looking at the code. Last week, malware...
Medicare Payments and Penalties in 2017
Posted December 30, 2016 in Compliance, Cloud Security, Data Breach
The number of physicians who will see their Medicare payments reduced by the Centers for Medicare & Medicaid...
Data Breach Exposes Nearly 400,000 Records
Posted December 30, 2016 in Compliance, Data Breach, Digital Forensics
A nonprofit health insurance company exposed nearly 400,000 patient records in a massive data breach. Learn how to...
What You Need to Know About Watering Hole Attacks
Posted December 29, 2016 in Malware, Data Breach, Cloud Security
We may never know exactly what happened to American electorate system during 2016, who was responsible, or how it...
Would You Let a Nurse Perform Your Heart Surgery?
Posted December 29, 2016 in Data Breach, Compliance, Cloud Security
Would you sign off on a room nurse performing open heart surgery on you? No, right? Then why do you buy devices that...
How Security Standards Eliminate Human Error
Posted December 29, 2016 in Data Breach, HIPAA, Compliance, Malware
Industry security standards reduce costly human errors that lead to data breaches. Learn which frameworks protect...
HIPAA Guidelines Decoded: What You Actually Need
Posted December 29, 2016 in HIPAA, Compliance, Data Breach
Government HIPAA guidelines are confusing. This plain-English guide decodes the key requirements so your medical...