Security Awareness Basics: Social Engineering

Are your employees part of the problem, or part of the solution?

Security awareness is important for organizations of all sizes (and sometimes required by law and/or industry standards). Different organizations face different types of threats, and proper security awareness training should be tailored to the risks your organization is likely to encounter. This series offers a basic overview of security concepts. For awareness training tailored to your employees and the risks your organization is likely to face, contact The Security Advocate.

Tagged with: , , , , , , , , , , , , , , , ,
Posted in Fraud & Scams, Laptops & Desktops, Network Security, Security Awareness

Security Awareness Basics: Phishing

Are your employees part of the problem, or part of the solution?

Security awareness is important for organizations of all sizes (and sometimes required by law and/or industry standards). Different organizations face different types of threats, and proper security awareness training should be tailored to the risks your organization is likely to encounter. This series offers a basic overview of security concepts. For awareness training tailored to your employees and the risks your organization is likely to face, contact The Security Advocate.

Tagged with: , , , , , , , ,
Posted in Fraud & Scams, Laptops & Desktops, Network Security, Privacy Issues, Security Awareness

Security Awareness Basics: Passwords

Are your employees part of the problem, or part of the solution?

Security awareness is important for organizations of all sizes (and sometimes required by law and/or industry standards). Different organizations face different types of threats, and proper security awareness training should be tailored to the risks your organization is likely to encounter. This series offers a basic overview of security concepts. For awareness training tailored to your employees and the risks your organization is likely to face, contact The Security Advocate.
Read more ›

Tagged with: , , , , , , , ,
Posted in Laptops & Desktops, Network Security, Privacy Issues, Security Awareness, Smartphones & Tablets

Yesterday’s Massive DDoS Attack Shouldn’t Have Been a Surprise. Here’s Why

An excerpt from my interview with host Jim Blasingame on The Small Business Advocate radio show earlier this month.

Tagged with: , , , , ,
Posted in Network Security

Cybersecurity 101: What Healthcare Providers Need to Know

By Stephanie J. Rodin, Esq.

Cybersecurity 101 What Healthcare Providers Need to Know By Stephanie J. Rodin, Esq.From a legal perspective, cybersecurity means that all confidential information, including patient health information (PHI), in a healthcare provider’s database or server is protected, confidential, and completely compliant with the Health Insurance Portability and Accountability Act (HIPAA).

In order to do so, healthcare providers should:

  1. Conduct a risk assessment of their data;
  2. Develop and institute data security policies; and
  3. Test the effectiveness of those policies to make sure that they are running correctly.

In the first part of the risk assessment, the healthcare provider should identify sensitive data, including names, Social Security numbers, facial photographs, email addresses, health information, and anything that’s considered confidential and protected pursuant to the law. All PHI should also be encrypted, as mandated by HIPAA.

The next step is to assess the risk of exposure. For example, what’s the risk of data being exposed through a security breach or because someone inappropriately obtains access to private and protected information? Is there a technical risk? Is there a risk for human error? Is there a physical security risk, such as the place where the sensitive data resides in the office or storage unit? Or perhaps there is a virtual security risk from the network access controls or password protocols being utilized by the practice?
Read more ›

Tagged with: , , , , , , , ,
Posted in Guest Posts, Privacy Issues