Maximizing Connectivity & Productivity

BLOG

(HIPAA) Health Insurance Portability and Accountability Act

(HIPAA)  Health Insurance Portability and Accountability Act   HIPAA Title I deals with protecting health insurance coverage for people who lose or change jobs.  HIPAA Title II includes an administrative simplification section which deals with the standardization of healthcare-related information systems.It is the Information Systems section what […]

Read more

PCI DSS 3.0 Making Compliance a part of your business

PCI DSS Compliance will be Mandatory by January 1 2015 What is PCI DSS? PCI DSS Stands for Payment Card Industry Data Security Standards The Payment Card Industry Data Security Standard (PCI DSS) was created to protect credit cardholder data, and it is now on version 3.0. […]

Read more

Email Policy and Compliance

Even though a large percentage of mid-sized and large organizations in North America have some sort of policy focused on the use of email, only 31% have a detailed and thorough policy about the appropriate use of email. This is a small amount considering the urgency of […]

Read more

Mitigating Windows XP Security Risks

Microsoft ended support for the 12 year old operating system XP on April 8/2014.  This unleashed a whole new era of potential problems in the teach world and companies, because of the surprising high number of XP machines out there.  Ending support meant that there would be […]

Read more

Attack code for ‘unpatchable’ USB flaw released

    The USB flaw means attackers can implant code on almost any USB-using device. Computer code that can turn any almost any device that connects via USB into a cyber-attack platform has been shared online. Computer security researchers wrote the code following the discovery of the […]

Read more

It’s a mistake for companies to go for off-the-shelf cybersecurity

A Globe and Mail interview regarding the impact and necessity of cybersecurity and why off the shelf product do not make the cut for companies. Highlights (see link for the full interview): So what can companies do to prevent attacks? Brian Rosenbaum: I’m big on training, education […]

Read more

Hiding data safely in the Cloud

In cloud computing data is being stored and processed while in the cloud. With cloud being a remote access platform, technical controls that enforce a security policy are efficient, but do not provide a full solution. The mechanisms are usually static, requiring security protocols to be removed […]

Read more

ON SCALING THE RAMPARTS AND GUARDING THE FORT

How much defending ourselves has changed over the last few centuries. From building walls high enough to reduce the chance of the enemy scaling the walls and getting into our courtyard; from putting shutters in the windows (migrating to grills), putting in key locks to e-locks, using […]

Read more

Real Goal of an IT Audit

The perception of auditors as ‘the police’ or as those out to catch mistakes and punish, is as we know, very common, sending waves of dread among those to be audited. The relationship between those to be audited and those doing the auditing is usually formal and […]

Read more

10 things deploying Microsoft Office can teach you

From TechRepublic: http://www.techrepublic.com/blog/10things/10-things-deploying-microsoft-office-can-teach-you/3438?tag=nl.e103&s_cid=e103

Read more
Page 1 of 812345...Last »
E-mail: info@netlogistix.com
Mississauga, ON, Canada 905.607.3500