Be Proactive to Prevent a Healthcare Data Breach

Chances are if you work in the healthcare industry you’ve heard of the Anthem data breach, where hackers illegally accessed millions of patient records and private information. This shows that healthcare organizations aren’t any more immune to data breaches than major retailers like Target or Home Depot — yet they’ve been slow to adjust to the high-tech environment.

Read more

C-Suite and Techies: Minimizing End User Errors

Security is an essential business responsibility. For the typical organization, at least half of the violations of the security policy are from internal personnel. While most of those violations are mistakes or errors caused by ignorance, some are performed intentionally and maliciously, against the company, other employees — or even customers. For a top executive, reducing these violations is crucial to maintaining a growing business. For an IT manager and/or security manager, reducing these violations is important to prevent downtime and improve efficiency. Fortunately, there are many steps that can be taken to help reduce end-user security violations. Most of these solutions are a combination of technology and training. And they are designed to address specific situations. These ideas might not address every issue occurring in your organization, but you are likely dealing with a majority of these concerns.

Read more

C-Suite and Techies: How to Communicate Cybersecurity

Organizational security is a complex task that needs focus and attention. The security design that protects a company from attack and compromise is not typically derived from of a preexisting template. Instead, it requires research and analysis of every aspect of an organization in order to craft a solution that is customized for the risks and needs of that company. One key element of security policy design and implementation is communication.

Read more

Top 5 Common Activities that Break Company Security Policy

Many employees are not as well-versed in their company’s security policy as they should be. This may result in workers performing tasks that might seem innocent or benign on the surface, but which actually put the organization at risk of a security breach. Understanding what you are doing (as an employee) or what your users are doing (as a boss or manager), can help you work toward a viable resolution to these situations. In most cases, user behavior changes as well as implementation of new technological solutions can curb exposure to risk and increase security policy compliance.

Read more