This past September I got a call out of the blue from an insurance agency manager who attended one of my first cyber security risk management classes two years ago. They wanted to know if I still offered my safeguard program and would that help them show compliance with the HIPAA Security Rule, also called the Omnibus Rule, which was about to become effective September 23, 2013. You see, I planted the seed of information by teaching ...READ MORE Share
And nobody seems to care….until something happens.
October is National Cyber Security Awareness (NCSAM) month and except for the IT community nobody seems to notice. There is a cyber-war brewing in the background getting drowned out by other attention grabbing headlines, mainly the U.S. Government shutdown over ObamaCare. The shutdown has furloughed critical national cyber-security personnel and the mainstream media is not publicizing it. But what would happen if suddenly the U.S. was under a very specific and damaging cyber-attack ...READ MORE Share
The White House says that the Syrian Electronic Army is not that sophisticated, but does that mean they are not a real threat and that we shouldn’t be concerned?
I just read an article on NBC Investigations about Syria and The Syrian Electronic Army (SEA) and I found a very interesting quote that is worth discussing further. The basis of their story is how the SEA is not being viewed as a serious threat to U.S. Government agencies because ...READ MORE Share
One noticeable difference between government and the private sector is the quantity of sensitive data. Governments tend to hold a larger amount of personally Identifiable Information (Social Security, Financial Information and Protected Health Information).
If this information is compromised, it will lead to sizable unplanned cash outflows. The “2011 Cost of a Data Breach” study published by the Ponemon Institute reports the average direct cost of a privacy incident is $73 per record. This is comprised of state and federally required ...READ MORE Share
Over the past few years the Internet has become a place where families can go for all kinds of entertainment, education and social networking with other family members and friends. It has also become a place where cyber-criminals seek to take advantage of people who are not properly protected against their tactics. Cyber-criminals work in different ways and it is especially important that households with children and teens become better prepared to defend themselves. We will discuss the top 8 ...READ MORE Share
In today’s business world digital information is fundamental to everyday operations. Whether it’s financial applications, e-mail communications, supply chain management, content management, sales order processing, or customer relationship management systems, data is the backbone of business. The more reliant a company is on digital data, the lower its tolerance for any interruption in application or data availability caused by “cyber-threats”. And the recent rise in high profile “cyber-incidents” such as computer viruses, data theft, identity theft and other cybercrimes make ...READ MORE Share