Hopefully, you'll realize some actions you should take to ensure your own business’ security.
The best way to inspire better security practices is to show examples of true security blunders.
What happens when forensic investigators can’t find evidence of a compromise?
Why do you need to comply with PCI if you’ve already taken care of HIPAA?
Maintaining HIPAA compliant passwords is a key step towards protecting ePHI.
Here are seven email phishing examples to help you recognize a malicious email and maintain email security.
Criminals have countless methods and types of phishing emails to trick email users.
Brand degradation and patient exodus will likely occur every time an organization shames their name through a data breach.
PCI compliance isn’t an event. It’s an ongoing process!
Contrary to popular belief, addressable does NOT mean optional.
You can send ePHI via email, but you have to do it securely, according to HHS.
Get answers to the most common firewall questions.
When those defaults aren’t changed, you give hackers Wonka’s Golden Ticket into your system.