If you’re like many business owners nowadays, you’re probably considering options when it comes to cyber insurance. Cyber insurance will likely protect you from a variety of liabilities that you’ll incur if a cyberattack successfully penetrates your business network.
Legal Expenses—if your company is in fact breached, you’ll want to get some legal advice to be informed of all of the specific obligations you have under state, federal and local laws. A company needs to move swiftly through a breach to survive and having legal counsel experienced in cyber incidents can make a big difference.
When sensitive data gets leaked, there may be numerous legal up-hill battles in front of your business. Cyber insurance usually includes coverages concerning about any of the legal incidents.
continue reading
It’s the beginning of 2018 and I’m sure you’ve got your business strategy ready (or near ready) to implement for the year. You’re likely concerned about getting more sales, keeping your existing clients happy, keeping your operations smooth, and your business secure.
As business security is becoming an increasing threat for all businesses and security compliance is becoming the rule (rather than simply a suggestion), I wanted to spend a little time today walking through how to prioritize security projects that have the biggest impact for your investment.
Here are the simple rules that I follow when prioritizing IT Security:
Develop your prioritization criteria—as you dive into prioritizing security, you need to identify criteria related to how security efforts will help your business long term in its strategy to both keep users and client data safe, while not impeding on day to day operational efficiency.
continue reading
Getting More Out Of Outlook
Do you get lost in hundreds or thousands of messages a week? There are so many tricks and tips to make your email easier to handle!
Since tracking messages is a big challenge for a lot of folks I’ve talked with lately, I thought I’d briefly go through how to keep track of all of those little requests (both ones you send and ones you receive) that are so easy to overlook.
The most common oversights Outlook users complain about when having to track messages are:
continue reading
According to the Department of Health and Human Services (HHS), healthcare organizations are failing to keep patient data secure. Security experts outside of HHS underscore that healthcare cybercrime will increase in 2018 because protected health information (PHI) has become a valuable commodity on the dark web.
Think a credit card is more valuable than healthcare information? Think again! The going rate for a healthcare record in 2018 is currently 1200 bucks! That’s more than 100 times more than the worth of a credit card.
The bottom line: criminals see healthcare as a major way to bank roll serious cash and if you’re not careful your office may be the next unsuspecting victim!
So that you’re prepared in 2018, I wanted to talk about the 10 most significant healthcare information security warnings that most experts believe will happen this year.
continue reading
Any important events coming up?
Just got through the New Year. Check. (Happy New Year by the way!)
Ready for an exciting 2018. Check.
Looking forward to a LOT more sales next year?
Are you ready for the deadline to the Payment Card Industry Data Security Standard (PCI DSS)?
On February 1, 2018, version 3.2 of the PCI DSS best practices will no longer be just “best practices”.
continue reading
The majority of physicians in the United States have experienced some sort of cybercrime in the past few years. A study by the American Medical Association (AMA) revealed that over 80% of doctors have experienced some sort of attack in recent years.
And the troubling part to me is the fact that most of these attacks could have been easily prevented if IT Support had simply implemented comprehensive and sustainable support aimed at HIPAA compliance (for more details on this, see my recent book on making HIPAA compliance and healthcare cybersecurity attainable).
Of doctors who reported having cyber incidents, many fall into all too common classifications:
continue reading