Boldon James Logo

Data Breach Trends – Are You In The Know?

Reading Time: 3 minutes Data breaches are on the rise – it’s a fact. In times like these, it’s important to ask yourself – are you being vigilant? And crucially, are you in the know? The following statistics have been taken from the… Read More

5 Types of Insider Threats in Healthcare – and How to Mitigate Them

Reading Time: 5 minutes Cybersecurity threats are happening constantly in healthcare – last year, a new breach was reported every day. From phishing attacks to malicious insiders, all sides can be left vulnerable. But the insider threat can be one of the most damaging… Read More

What is SOX Compliance? 2019 SOX Requirements & More

Reading Time: 3 minutes A definition of SOX Compliance In 2002, the United States Congress passed the Sarbanes-Oxley Act (SOX) to protect shareholders and the general public from accounting errors and fraudulent practices in enterprises, and to improve the accuracy of corporate disclosures. The act… Read More

HHS: Data Protection Among Best Practices For Healthcare Cybersecurity

Reading Time: 3 minutes A set of cybersecurity best practices recently published by the Department of Health and Human Services (HHS) looks at five of the biggest cyber threats to the healthcare industry and how to best mitigate them. The U.S. Department of… Read More

Deploy Multiple Defence Layers To Protect Data-Rich Applications

Reading Time: 3 minutes What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? The first step any organisation needs to take to protect itself against an application layer attack is… Read More