Governance & IT Compliance
Data Security: New HIPAA Policies & Procedure on Ransomware Disclosures
The Department of Health & Human Services for Civil Rights (OCR) has issued guidance on how to manage the increasing frequency of ransomware attacks toward healthcare providers. Ransomware is a malware which encrypts data until a ransom is paid to the hacker, who in return, will hopefully issue the encryption key to unlock the data on your machines. It is a very real threat for any provider who has electronic…
ContinuedHow to Counteract VoIP Vulnerabilities: VoIP Security Risks
In today’s day and age we have become familiar and hopefully cautious when receiving strange emails with a random file attached. It’s unlikely that we would give it a second thought before deleting. This is because we recognize the need for cyber security to limit the onslaught of digital threats we receive on a seemingly daily basis. What we often overlook however, is that voice over IP (VOIP) services are…
ContinuedHow to Become PCI Compliant: An Informal PCI Compliance Checklist
If your business processes credit cards or other forms of electronic payment, it is required to meet the standards established by the Payment Card Industry (PCI). That means not only retailers, but any establishment that accepts card payments in their place of business. If you don’t maintain PCI standards for compliance and suffer a data breach, you could face penalties ranging from $5,000 to $100,000 a month, putting your entire…
ContinuedSQL Server 2005 End of Support Deadline
Effective April 12, 2016 Microsoft will no longer be supporting SQL Server 2005. This means that as of that date Microsoft will no longer be pushing out security updates or hot fixes and, as a result, your organization could be left facing vulnerabilities such as: – Impaired function of applications based off of the SQL Database, – Applications that are at risk for security breaches or bugs, – Backups that…
ContinuedA New Credit Card Format and PCI Compliance
Finally, we are almost there! The United States is following the lead of other industrialized nations and converting its credit card format from the current magnetic strip to a card that contains a built-in computer chip. The chip makes it more difficult for hackers to steal, and since each transaction generates a random code (or token), it decreases the effectiveness of “snooping devices” that try to record your personal information.…
Continued- « Previous
- 1
- 2
- 3
- 4
Categories
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
