Tag: two-factor authentication

Staying ahead of the cloud cybersecurity curve

For the upcoming IMN Data Center East Conference, I’ve been invited to speak on the panel called “Staying Ahead of the Curve on Services” about managed services for data center operators. From my experience, two of the highest value managed … Continue reading

Posted in CEO Voices, Cloud Computing, Managed Servers | Tagged , , , , , , , , | Leave a comment

Midwest HIMSS Fall Tech Conference: Preparing for Cyber Attacks

Online Tech is liveblogging from Milwaukee at Rock IT Around the Clock! That’s the theme for the HIMSS Midwest Area Chapters Fall Technology Conference November 10-12, where we’re exhibiting our HIPAA hosting solutions at booth #501. Here’s our takeaways from a session … Continue reading

Posted in HIPAA Compliance | Tagged , , , , , , , | Leave a comment

Celebrating National Cyber Security Awareness Month (NCSAM)

October is National Cyber Security Awareness Month (NCSAM), celebrated annually to highlight awareness about online security for consumers, small and medium-sized businesses (SMBs), corporations, educational institutions and young people nationwide. NCSAM will focus on different aspects of online security, including … Continue reading

Posted in Information Technology Tips | Tagged , , , , , | Leave a comment

PCI DSS Data Breaches Increase 15 Percent; Remote Access & SQL Injections to Blame

A few major takeaways from Trustwave’s 2013 Global Security Report reveal that the retail industry was at the top of data breach investigations at 45 percent. A total of 96 percent of customer records (payment card data, PII (personally identifiable … Continue reading

Posted in Information Technology Tips, PCI Compliance | Tagged , , , , , | Leave a comment

2013 Global InfoSec Spending to Hit $64.4 Billion

Global spending on information security is expected to total $64.4 billion this year with an average annual growth rate of 8.7 percent over the next four years, according to Lawrence Pingree, research director at Gartner, as reported by USAToday.com. Information … Continue reading

Posted in Cloud Computing, Encryption | Tagged , , , , , , , , , , | Leave a comment

Why Authentication is the Answer to Your Cloud Worries

The following is a guest blog from Ann Arbor-based Duo Security‘s Security Evangelist, Mark Stanislav: A recent article from Forbes titled, “Is Your Investment In Security Really Worth It?”, called into question whether or not the money spent for information security … Continue reading

Posted in Cloud Computing | Tagged , , , , , , , | Leave a comment

Chain of Trust: Importance of Vetting Third-Party Security

While you may think your organization has all of the appropriate technical, physical and administrative security in place to guard against a data breach, what about your third-party vendors and additional web-based software that you use on your website or … Continue reading

Posted in Information Technology Tips | Tagged , , , , , | Leave a comment

HIPAA Security Lessons from a Michigan Healthcare CIO

HealthITSecurity.com recently conducted an interview with Frank Fear, CIO of Memorial Hospital in Michigan, a medium-sized healthcare organization with approximately 1,000 desktops to manage. Learn from his lessons and a few from us to create a completely secure and efficient … Continue reading

Posted in Disaster Recovery, Encryption, HIPAA Compliance | Tagged , , , , , , | Leave a comment

Achieving a Layered Data Security Solution for PCI DSS Compliance

For ecommerce websites, partnering with a PCI DSS compliant hosting provider can help you achieve many requirements of the standard while building a layered security solution to protect credit cardholder information, whether stored or merely in transit. Where should you … Continue reading

Posted in PCI Compliance | Tagged , , , , , , , | Leave a comment

Health IT Security: Raising the Bar to Protect PHI

The healthcare field has become a target for cyber-criminals because of the wide array of sensitive data it protects. Organizations looking to protect that data should first turn to two-factor authentication, Duo Security Regional Director Zoe Lindsey said in a … Continue reading

Posted in HIPAA Compliance | Tagged , , , | Leave a comment