In this post, we’ll take a closer look at data encryption strategies, including how to make sure you’re encrypting the right data, how to avoid common pitfalls, and how to adhere to best practices.
Following rapid changes to support a new, widespread remote workforce, organizations are encountering a wide range of logistical, security, and cost ramifications they haven’t previously had to [...]
While Microsoft is great at delivering these applications, many organizations overlook management of the data generated by O365 apps. You have a certain responsibility to secure your data, ensure [...]
Eighty-three percent of organizations do not feel prepared for GDPR. Follow these steps to get ready by the May 25, 2018 deadline.
HIMSS is the perfect blend of education, collaboration, and introduction to new solutions designed to address the health care industry’s biggest, most persistent, and emerging issues. Moving to [...]
The GDPR: This EU regulation doesn't just affect companies in Europe. Find out what it is, who it affects, and how to avoid penalties.
Last July, the Office of Personnel Management announced it had discovered a huge data breach: The background check records of current, former, and prospective federal employees and contractors [...]
Which causes business leaders to buy into an IT security assessment quicker: ransomware or a data breach? Both. Unfortunately, that’s just the situation a regional health care provider [...]
Coffee shop Wi-Fi is evil. So is every other public Wi-Fi. That’s because open Wi-Fi has no security. Full stop, period. We’ve all heard that we should be careful about what we do on public [...]
Though your company’s sensitive data is closely guarded, locked away behind firewalls and password-protected portals, there’s another threat that should keep you up at night. That gnawing feeling [...]