What is Cybersecurity?

by Shannon Lane / October 11, 2023

What is cybersecurity, and why does it matter? The answer boils down to this: it’s a commitment to ensuring that the trust placed in your business by your clientele is warranted, understood, and treated as the precious commodity it is. It is a commitment to the understanding that you will do everything in your power to protect your clients from those who would do them harm, and that you will…

Not All Penetration Tests Are Created Equal

by Sarah Harvey / December 16, 2022

When you vet a company or an individual to perform penetration testing on your organization, what do you look for? Price, certifications, experience? Those are all important aspects, but you must also consider the quality of the penetration testing you will receive. All too often, we see organizations who pay for a penetration test and are expecting a thorough service receive a vulnerability scan labeled as a penetration test from…

GDPR Fundamentals: Data Security Requirements

by Mark Hinely / October 11, 2023

 Appropriate Data Security Controls While GDPR is primarily a data privacy law, it also includes elements of data security. But of course, GDPR is ambiguous so it’s not very prescriptive when it comes to data security requirements for processing personal data. The law requires each organization to evaluate its own data security based on risk, processing activities, and its organizational structure. By putting this in the hands of the…

How Mobile Devices Impact Protected Health Information

by Sarah Harvey / June 14, 2023

The use of mobile devices has absolutely transformed healthcare. Have you ever checked into a walk-in clinic on a tablet? Has a doctor shown you X-rays through a digital screen, rather than on film? Have you paid a medical bill through an app? Mobile devices are altering patient care. The need for mobility in healthcare settings is pervasive and the security threats that mobile devices pose are only going to…

How to Lead a Cybersecurity Initiative

by Sarah Harvey / June 14, 2023

Are you a CISO, CCO, ISO, or member of the IT department that’s building and leading a cybersecurity strategy? Don’t know where to start? The foundation of a cybersecurity strategy should be built on basic principles of security – patch management, risk assessment, network monitoring, vulnerability management. From there, you must cultivate awareness of the evolving threat landscape, observe regulatory responses, continue to train and invest in your team, and…