The Cost and Consequences of Exposed PII

Reading Time: 5 minutes Hardly a day goes by without a media report about a data breach that involves exposed personally identifiable information (PII), and it’s no wonder that we hear about this so often; the latest IBM global study of data breaches… Read More

Data Breach Trends – Are You In The Know?

Reading Time: 3 minutes Data breaches are on the rise – it’s a fact. In times like these, it’s important to ask yourself – are you being vigilant? And crucially, are you in the know? The following statistics have been taken from the… Read More

5 Types of Insider Threats in Healthcare – and How to Mitigate Them

Reading Time: 5 minutes Cybersecurity threats are happening constantly in healthcare – last year, a new breach was reported every day. From phishing attacks to malicious insiders, all sides can be left vulnerable. But the insider threat can be one of the most damaging… Read More

What is SOX Compliance? 2019 SOX Requirements & More

Reading Time: 3 minutes A definition of SOX Compliance In 2002, the United States Congress passed the Sarbanes-Oxley Act (SOX) to protect shareholders and the general public from accounting errors and fraudulent practices in enterprises, and to improve the accuracy of corporate disclosures. The act… Read More

HHS: Data Protection Among Best Practices For Healthcare Cybersecurity

Reading Time: 3 minutes A set of cybersecurity best practices recently published by the Department of Health and Human Services (HHS) looks at five of the biggest cyber threats to the healthcare industry and how to best mitigate them. The U.S. Department of… Read More