Subscribe

FBI Censors Released Documents


Posted January 10, 2017 in Data Breach, Digital Forensics, Compliance

You may recall the tiff between Apple and the FBI following the shooting that took place on December 2, 2015 in San...

Did Russia Invade Vermont?


Posted January 10, 2017 in Malware, Data Breach, Cloud Security

One way investigators have of identifying the source of computer hacks is by looking at the code.  Last week, malware...

Medicare Payments and Penalties in 2017


Posted December 30, 2016 in Compliance, Cloud Security, Data Breach

The number of physicians who will see their Medicare payments reduced by the Centers for Medicare & Medicaid...

Data Breach Exposes Nearly 400,000 Records


Posted December 30, 2016 in Compliance, Data Breach, Digital Forensics

A nonprofit health insurance company exposed nearly 400,000 patient records in a massive data breach. Learn how to...

What You Need to Know About Watering Hole Attacks

What You Need to Know About Watering Hole Attacks


Posted December 29, 2016 in Malware, Data Breach, Cloud Security

We may never know exactly what happened to American electorate system during 2016, who was responsible, or how it...

Would You Let a Nurse Perform Your Heart Surgery?


Posted December 29, 2016 in Data Breach, Compliance, Cloud Security

Would you sign off on a room nurse performing open heart surgery on you? No, right? Then why do you buy devices that...

How Security Standards Eliminate Human Error


Posted December 29, 2016 in Data Breach, HIPAA, Compliance, Malware

Industry security standards reduce costly human errors that lead to data breaches. Learn which frameworks protect...

HIPAA Guidelines Decoded: What You Actually Need


Posted December 29, 2016 in HIPAA, Compliance, Data Breach

Government HIPAA guidelines are confusing. This plain-English guide decodes the key requirements so your medical...