Boldon James Logo

HHS: Data Protection Among Best Practices For Healthcare Cybersecurity

Reading Time: 3 minutes A set of cybersecurity best practices recently published by the Department of Health and Human Services (HHS) looks at five of the biggest cyber threats to the healthcare industry and how to best mitigate them. The U.S. Department of… Read More

More PHI Breaches Caused By Providers, Insiders, Report Says

Reading Time: 3 minutes More Protected Health Information (PHI) is leaked by healthcare providers, not hackers, academic research by Michigan State University and Johns Hopkins University released Monday says. Researchers say that when it comes to data breaches, more than half of the… Read More

How Can Companies Move The Needle On Enterprise Cloud Security Risks And Compliance?

Reading Time: 3 minutes More than ever, customers understand their right to data privacy. As major brands continue to lose sensitive data to cybercriminals in high-profile cloud security failures, customer trust in companies across industries is fading. Only 25 percent of consumers believe… Read More

In Terms Of Main Threat Actors, Expectation Rarely Matches Reality

Reading Time: 2 minutes Netwrix conducted a study of the major IT risks that are significant for most organizations and assessed respondents’ readiness to withstand cyber threats. The report is based on the feedback of 1,558 organizations of various sizes from many different… Read More

The 5 W’s of Data Identification and Inventory

Reading Time: 2 minutes Eric Vanderburg, Vice President of Cybersecurity at TCDI, highlights the key questions to consider when identifying your organisation’s data, its importance and the level of protection required… I always figured that you would need to know what you have in… Read More