Boldon James Logo

HHS: Data Protection Among Best Practices For Healthcare Cybersecurity

A set of cybersecurity best practices recently published by the Department of Health and Human Services (HHS) looks at five of the biggest cyber threats to the healthcare industry and how to best mitigate them. The U.S. Department of… Read More

Why The CISO’s Voice Must Be Heard Beyond The IT Department

In a recent company board strategy meeting, the CFO presented the financial forecast and outcome and made some interesting comments about fiscal risks and opportunities on the horizon. The COO discussed efficiency in operations, explained how the company may… Read More

More PHI Breaches Caused By Providers, Insiders, Report Says

More Protected Health Information (PHI) is leaked by healthcare providers, not hackers, academic research by Michigan State University and Johns Hopkins University released Monday says. Researchers say that when it comes to data breaches, more than half of the… Read More

Deploy Multiple Defence Layers To Protect Data-Rich Applications

What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? The first step any organisation needs to take to protect itself against an application layer attack is… Read More

In Terms Of Main Threat Actors, Expectation Rarely Matches Reality

Netwrix conducted a study of the major IT risks that are significant for most organizations and assessed respondents’ readiness to withstand cyber threats. The report is based on the feedback of 1,558 organizations of various sizes from many different… Read More