(HIPAA) Health Insurance Portability and Accountability Act HIPAA Title I deals with protecting health insurance coverage for people who lose or change jobs. HIPAA Title II includes an administrative simplification section which deals with the standardization of healthcare-related information systems.It is the Information Systems section what […]
Read more →PCI DSS Compliance will be Mandatory by January 1 2015 What is PCI DSS? PCI DSS Stands for Payment Card Industry Data Security Standards The Payment Card Industry Data Security Standard (PCI DSS) was created to protect credit cardholder data, and it is now on version 3.0. […]
Read more →Even though a large percentage of mid-sized and large organizations in North America have some sort of policy focused on the use of email, only 31% have a detailed and thorough policy about the appropriate use of email. This is a small amount considering the urgency of […]
Read more →Microsoft ended support for the 12 year old operating system XP on April 8/2014. This unleashed a whole new era of potential problems in the teach world and companies, because of the surprising high number of XP machines out there. Ending support meant that there would be […]
Read more →The USB flaw means attackers can implant code on almost any USB-using device. Computer code that can turn any almost any device that connects via USB into a cyber-attack platform has been shared online. Computer security researchers wrote the code following the discovery of the […]
Read more →A Globe and Mail interview regarding the impact and necessity of cybersecurity and why off the shelf product do not make the cut for companies. Highlights (see link for the full interview): So what can companies do to prevent attacks? Brian Rosenbaum: I’m big on training, education […]
Read more →In cloud computing data is being stored and processed while in the cloud. With cloud being a remote access platform, technical controls that enforce a security policy are efficient, but do not provide a full solution. The mechanisms are usually static, requiring security protocols to be removed […]
Read more →How much defending ourselves has changed over the last few centuries. From building walls high enough to reduce the chance of the enemy scaling the walls and getting into our courtyard; from putting shutters in the windows (migrating to grills), putting in key locks to e-locks, using […]
Read more →The perception of auditors as ‘the police’ or as those out to catch mistakes and punish, is as we know, very common, sending waves of dread among those to be audited. The relationship between those to be audited and those doing the auditing is usually formal and […]
Read more →