The Harsh Reality About Data Breach Clean Up

By

There is much more involved in a data breach than just losing valuable information. Now, don’t get me wrong, a breach can cost millions solely due to the information stolen, but this is often times covered by insurance and is just the tip of the ice burg. The clean up is where it really begins. What to Expect During Clean Up 1. You may need to hire an outside company to investigate the data breach internally, it’s not good press to let the hacker get away cleanly and lose all your hard earned customers. 2. If your customers money is… Read more ›

The Harsh Reality About Data Breach Clean Up

By

There is much more involved in a data breach than just losing valuable information. Now, don’t get me wrong, a breach can cost millions solely due to the information stolen, but this is often times covered by insurance and is just the tip of the ice burg. The clean up is where it really begins. What to Expect During Clean Up 1. You may need to hire an outside company to investigate the data breach internally, it’s not good press to let the hacker get away cleanly and lose all your hard earned customers. 2. If your customers money is… Read more ›

Security Tip of the Week!

By

  Tip #5: Multi-Factor Authentication The security tip of the week this week focuses on multi-factor authentication and how it can help you add extra security to access points on electronic devices. A single authentication is considered to be something that only the user should know (e.g. password, PIN, a specific pattern) but is often not secure enough if the user is attempting to access confidential data on the device. It is important to check which level of authentication is best for you because authentication methods that depend on more than one factor are more difficult to compromise than a… Read more ›

Don’t Wait for the OCR to Come Knocking

By

For healthcare IT security professionals, the past 10 years has been characterized by both unrealistic expectations from higher up’s and frustration of not being able do enough.   No Time, Money, or People   Without being given the adequate resources, and personnel, S&R professionals have repeatedly found themselves in a position where they are unable to cultivate a mature security program, and properly safeguard sensitive health information.  “We struggled to be heard in our organizations, to implement policies and strengthen passwords. But we were often thwarted and viewed as obstacles if not threats, to patient care.”, writes Kate Borten, a… Read more ›

nCrypted Cloud is Heading to the 2014 RSA Conference!

By

The 2014 RSA Conference is being held February 24-28 at the Moscone Center in San Francisco and nCrypted Cloud will be there! The RSA Conference focuses on cryptography and information security and brings together hundreds of companies that are in the security, compliance, and risk-management solutions industries. The conference is used to announce new products, network companies, bring in potential investors and helps drive the information security agenda worldwide with annual industry events in the U.S., Europe and Asia. nCrypted Cloud is going to announce an exciting new partnership at the RSA conference this year, so stay tuned…

Security Tip of the Week!

By

Tip #4: Make Sure to Back Up Data on your Computer Regularly! The Break Down This may seem like another obvious tip but a majority of computer users do not back up their data regularly. If data is not backed up it can be lost instantly, whether it be a fire, flood, your computer is stolen, or it just simply breaks down. People often lose their data because they choose not to. According to Backblaze.com, “56 percent of our customers said they started backing up as a result of themselves or a friend losing data.” Don’t be this person! It’s… Read more ›

Workplace Collaboration In The Digital World

By

Workplace Collaboration There is no denying it, collaboration within the enterprise exists and cannot be ignored. According to a recent Forrester article on collaboration: Today, 97% of information workers regularly communicate or collaborate with others in their company as a part of their day-to-day job 76% say the same when it comes to contact with customers or clients, 64% do so with suppliers, vendors, and partners. This number may seem meaningless to most, but confidential data gets sent improperly everyday throughout companies. Forrester created a poll of the typical collaboration occurring within the workplace which best illustrates the vastness: This graph clearly shows… Read more ›

Security Tip of the Week!

By

Tip #3: Be Careful What Network You Join! • Avoid doing anything confidential on a public network; this includes airports, coffee shops, and fast food restaurants. The reason for this is you have no administration over the computer, so you have no idea who has access to your information. • Because of the lack of security on open networks, hackers can actually scan the plaintext traffic from the network used and can analyze and steal your passwords. • Some scammers will actually set up a fake “Free Wifi” network in order to draw people into their networks and will then… Read more ›

Too Small for IT, Not Too Small For the HIPAA Act

By

The Government is Cracking Down on HIPAA The HIPAA Act has been making media waves across the country. The newly redesigned HIPAA Act has been exposing security flaws within the healthcare system and they have paid heavily for it. This has been happening frequently and according to Marianne McGee from Healthcareinfosecurity.com, “More than 70 incidents have been added in the last month to the Department of Health and Human Services’ “wall of shame” website listing health data breaches affecting 500 or more individuals – far more than in any other recent month.” It can begin easily with one little mistake.… Read more ›

Security Tip of the Week!

By

  “According to a report by Trusteer, based on a sample of 3 million users collected over a period of 3 months, approximately 45% of the time, users submitted their login information to the phishing site they visited.” -ZDNet.com Tip #2: Avoid Toxic Websites Look for a “green lock” at the beginning of the website’s URL. This signifies a secure connection with the site. If you are planning on entering personal information make sure there is Https:// at the beginning of the URL. The S in Https:// stands for secure and can keep people from eavesdropping on your information. Some data thieves will… Read more ›