Questions? Contact Us

 

What is gained from Cybersecurity and Physical Security Convergence?

It amazes me that I still sometimes hear people talking about cybersecurity (logical security) and physical security as if they're separate issues to address and manage. Today, in our connected world, that's not the case at all. Our digital world has produced a convergence of physical and logical security that brings value to how you protect your m...
Continue reading
2746 Hits
0 Comments

Tips for Optimizing PCI Compliance

​Sparked by the increase in credit card fraud, PCI DSS compliance went into effect in 2004 to help protect cardholder data. The Payment Card Industry Data Security Standard (PCI DSS) applies to all entities that store, process, and/or transmit cardholder data and those entities that can impact this data. The only exception is Telco Companies that o...
Continue reading
1484 Hits
0 Comments

Five must-haves in any disaster recovery plan

In January the United States saw some of the coldest temperatures on record, an earthquake outside of San Francisco, and mudslides in California. Those Mother Nature events probably didn't affect anyone's computer up time, but they could have. Cold temps produce ice which can break trees and cause damage to equipment; earthquakes can topple buildin...
Continue reading
1310 Hits
0 Comments

Can your business pass the data privacy test?

In addition to being Blueberry Pancake Day, Sunday, Jan. 28, 2018, is Data Privacy Day. Data Privacy Day is led by the National Cyber Security Alliance (NCSA) in the United States. According to NCSA: "Data Privacy Day commemorates the 1981 signing of Convention 108, the first legally binding international treaty dealing with privacy and d...
Continue reading
1225 Hits
0 Comments

Three Practices for Defending Against the Threat from Inside

Cybersecurity Insiders and Crowd Research Partners recently released their "Insider Threat 2018 Report." The report surveyed 472 cybersecurity professionals about their view and position on the threat posed by "insiders" – the employees and partners that have access to an organization's business operating systems and data. The report reminds us tha...
Continue reading
1112 Hits
0 Comments

Two-Factor vs. Multi-Factor Authentication: Which One is Right for You?

By now, most organizations serious about security have implemented some form of two-factor or multi-factor authentication. While both have been around for a long time and widely discussed and debated in security circles, they garnered the spotlight in mainstream media several years ago when Hollywood actresses had their iCloud accounts hacked and t...
Continue reading
1123 Hits
0 Comments

Four Tips for Safe and Secure Holiday Shopping – Buyer Be Aware!

Post-Thanksgiving shopping has changed. Black Friday now begins on Thursday (if not sooner) and the Cyber Monday deals may last all week (or longer). But that doesn't mean you shouldn't take care to protect your personal information and your finances, whether shopping with your feet in the stores or with your fingers online.Here are a few security ...
Continue reading
1409 Hits
0 Comments

Will the Password Ever Go Away?

We have a love/hate relationship with our passwords. We have to love them because they give us access to practically everything necessary in our home and work life – from banking and email accounts to Netflix and school activity accounts. The hate part comes in when we try to recall what password we created for each account – and there are many fro...
Continue reading
1240 Hits
0 Comments

Three Ways to Improve the Security and Reduce the Cost of Password Resets

Using passwords as a primary means of authentication for account logins is not going away soon. Despite the work being done to bring in other authentication mechanisms, passwords are here to stay – at least for the near future.We don't use passwords because they're the most secure option today; we use them because they're convenient and cheap compa...
Continue reading
977 Hits
0 Comments

What’s on your cyber security checklist?

If you're using October – National Cyber Security Awareness Month – to take a hard look at your security practices, policies, procedures and systems, we'd like to offer a starting point for a security checklist, examining some of the key considerations from a people, process and technology viewpoint.People: Disgruntled or uninformed employees are o...
Continue reading
1163 Hits
0 Comments

Kick off National Cyber Security Awareness Month with these nine tips for safer computing

October is National Cyber Security Awareness Month. A collaborative effort between government and industry, National Cyber Security Awareness Month (NCSAM) provides education, information and best practices for staying safe online to consumers, employees, parents and children.Basic tips and advice have been broken down into three key themes: Keep a...
Continue reading
1128 Hits
0 Comments

A provider’s survival guide to HIPAA threat evaluation

Within the Health Insurance Portability and Accountability Act (HIPAA) are two fundamental rules that all covered entities (like health care providers) need to understand and follow.The HIPAA Privacy Rule applies to Protected Health Information (PHI) broadly, and falling under that is the HIPAA Security Rule which focuses on electronic Protected He...
Continue reading
1100 Hits
0 Comments

Cybersecurity Awareness Event to Offer Practical Tips on Identity Theft Protection for Individuals and Small Businesses

Local business owners and the general public are invited to a free Cybersecurity Awareness Event on August 17 at 6:30 PM in the Pembroke Office Park Building in Virginia Beach.Industry experts will explain – in layman's terms – why cybersecurity is more important than ever and what practical steps individuals can take to protect themselves from onl...
Continue reading
1450 Hits
0 Comments

WannaCry Ransomware Teaches Painful Lesson in Patch Management

​Irony. A state of affairs or an event that seems deliberately contrary to what one expects and is often amusing as a result.When you think about it, isn't it ironic that we spend a great deal of money on expensive bags, covers and screen protectors to protect the OUTSIDE of our computer devices when the real threat comes from the INSIDE? There's n...
Continue reading
1186 Hits
0 Comments

For HIPAA controls, how O can you go?

There's devil in the details of the various controls organizations use to ensure compliance with the requirements of the Health Insurance Portability and Accountability Act (HIPAA). We highlighted them all in a recent blog post if you want to read more. Broken out as administrative, operational or technical, HIPAA controls refer to the various proc...
Continue reading
1430 Hits
0 Comments

What providers really need to know about HIPAA Title II

The massive Health Insurance Portability and Accountability Act (HIPAA) enacted by congress in 1996 is broken out into five different titles, with Title II being the one most heavily focused on security and privacy. Title II set, for the first time, key standards for electronic health care transactions and national identifiers for providers, health...
Continue reading
1823 Hits
0 Comments

The devil in the HIPAA controls details

When it comes to meeting the requirements of the Health Insurance Portability and Accountability Act (HIPAA), there are many potential controls that health care providers can implement to protect themselves against threats that could compromise sensitive data, like patients' electronic personal health records (PHR).Getting a handle on the controls ...
Continue reading
1175 Hits
0 Comments

Springtime for hackers

​With blooming flowers, chirping birds and warming temperatures, spring finally arrived in April. But it seems the wonders of nature aren't the only thing that spring brought us. We're also getting fresh reports of hackers who are up to no good.And I'm not talking about Netflix having their shows stolen, held for ransom and released online. While t...
Continue reading
1231 Hits
0 Comments

Security in the Cloud: It’s Easier Than You Think

The shift in recent years to cloud computing has put seemingly unlimited computing and data storage capacity at the fingertips of the masses – from the smallest businesses to the largest corporations. Increasingly, there's often little thought put into uploading that next batch of files to the cloud or spinning up that new virtual server, as the bi...
Continue reading
1173 Hits
0 Comments

For businesses breached, the meter keeps on running

On March 8, Home Depot agreed to pay a $25 million settlement to a group of banks for damages incurred during the company's massive 2014 data breach. During that breach, email or credit card information was stolen from more than 50 million customers by thieves who hacked store self check-out terminals.It's one of the largest breaches in history, bu...
Continue reading
1356 Hits
0 Comments