Why Your Business Requires Security

The States and Federal Identity Theft and Privacy Protection Laws now require businesses, agencies and organizations of all sizes to protect all personal information they store, and report to all their customers whenever a breach occurs. The financial ramifications after having a data breach can be very substantial to both present and future business. In some many cases a company never does recover from a breach and is forced to close down. Currently, the average cost on a company is $3.7M per incident.

Author Archive

Jul
22

Medical ID theft is nothing to sneeze at

Posted by: | Comments Comments Off on Medical ID theft is nothing to sneeze at

Below is a report from the Smart Card Alliance on Medical Identity Theft. While the info is staggering the walk away points for me is the migration to PHRs, EHRs and HIEs. Security has to start at the very beginning and that is where a secure token and password manager combination work well together.

Medical Identity Theft in Healthcare

Publication Date: March 2010

While identity theft is a global issue that garners much media attention, most do not realize that medical identity theft is a serious and growing threat. Many authorities consider medical identity theft one of the fastest growing crimes in America. With the Read More→

Comments Comments Off on Medical ID theft is nothing to sneeze at
May
26

ATT Internet Outage

Posted by: | Comments Comments Off on ATT Internet Outage

We are monitoring what was the cause of the large internet outage yesterday. Don’t know if it was a security attack or some faulty equipment. Eitherway, when was the last time you backed up your website data?

Categories : General
Comments Comments Off on ATT Internet Outage
May
22

Facebook Privacy Settings

Posted by: | Comments Comments Off on Facebook Privacy Settings

“ATTENTION !!!!!!! As of today, there is a NEW PRIVACY setting called “Instant Personalization” that shares data with non-Facebook websites and it is automatically set to “Allow”. Go to Account> Privacy Settings > Applications and Websites > Instant Personalization> Edit Settings, and uncheck “Allow”. BTW if your friends don’t do this, they will be sharing information about you.

Comments Comments Off on Facebook Privacy Settings
May
18

How Secure are the Secure Email Programs?

Posted by: | Comments Comments Off on How Secure are the Secure Email Programs?

HITECH is the latest requirement to secure HIPAA. And while there are many parts to these regulations, the latest question I have been getting is finding a good secure email and encryption document attachments application. Well, it turned out to be like asking me for a good flavor of ice cream. It really depends on your taste. There are many different ways companies have implemented security.

In the world of secure emails the choice may be based around your preferred communications channel (smart phone, PC, netbook, etc), what is convenient to you, are you more of a cloud person or a PC based email app user, price per user, number of emails that can be sent, and so forth. But the number one perspective you have to have in evaluating any of these different products is how convenient is it to your recipients. I am a firm believer that if you make security cumbersome, then users will always find ways to circumvent security for their own convenience. However, you can’t make something so convenient that security is thrown out the window. It’s a balancing act. Read More→

Comments Comments Off on How Secure are the Secure Email Programs?
May
17

Email marketing is a waste of time and money

Posted by: | Comments Comments Off on Email marketing is a waste of time and money

Not for reason you might think. Internet security or the lack there of, has made users suspicious and distrustful to all unsolicited emails. Let’s first take the argument from the personal perspective. We all have been hit with spam in our email accounts. We may have also experiences are own email address being hijacked by email spoofers.  All with the intent to get the recipient to click a link or open a file to start the process of identity theft. Read More→

Categories : Business Security
Comments Comments Off on Email marketing is a waste of time and money
FLEXCAP
SiteLock