Implementing the CIS 20 Critical Security Controls

With the increasing number of data breaches each year, it is crucial for every organization to ensure that they have all necessary security controls in place to keep their data secure.

Although many organizations have a variety of tools and best practices to secure infrastructure against interruptions, many do not know what they should focus on first and are not sure which security measures will have the most significant impact. Continue reading Implementing the CIS 20 Critical Security Controls

HIPAA Compliance is Not Enough

The idea of healthcare data security has changed dramatically in the last 21 years, since the Health Insurance Portability & Accountability Act (HIPAA) was passed in 1996.

As explained by the Digital Guardian, HIPAA sets the standard for sensitive patient data protection, and companies that deal with protected health information (PHI) must have physical, network, and process security measures in place and follow them to ensure HIPAA Compliance. Continue reading HIPAA Compliance is Not Enough

The Importance of Using a Firewall

In today’s business, data is more valuable than ever. Whether your computer is designated for personal use or you run a billion-dollar corporation, data security should be one of your number one priority, and it must be protected against cybercrime. If you don’t, you are at risk of competitors or thieves hacking your systems and getting access to valuable data. Continue reading The Importance of Using a Firewall

The Role of Cloud Computing and Fog Computing in IoT

The Internet of things (IoT) is the inter-networking of physical devices, vehicles (also referred to as “connected devices” and “smart devices”), buildings, and other items embedded with electronics, software, sensors, actuators, and network connectivity which enable these objects to collect and exchange data.

The Internet of Things (IoT) is increasingly part of all of our lives, personally and business-wise. An enormous amount of data is also being generated through IoT devices, creating a need for larger data silos and generating more network and internet traffic than before.

Thanks to instruments such as Cloud Computing, we’re able to deliver a variety of data types through the internet to remote data centers. Continue reading The Role of Cloud Computing and Fog Computing in IoT

Types of Cyber-attacks and how to prevent it

Let’s examine the most common type of cyber-attacks that your business could face and ways to avoid them.

  1. Malware is an all-encompassing term for a variety of cyber threats including Trojans, viruses and worms. Malware is simply defined as code with malicious intent that typically steals data or destroys something on the computer.

How does it work? Malware is most often introduced to a system through email attachments, software downloads or operating system vulnerabilities. 

How can I prevent it? The best way to prevent malware is to avoid clicking on links or downloading attachments from unknown senders. Continue reading Types of Cyber-attacks and how to prevent it

What is a Web Filter and Content Filter?

Web Filter also known as Content Control Software is a kind of software which is installed on a user’s computer to prevent the user from being able to access anonymous/uncategorized websites. It’s the preferred method by which most organizations implement, to protect sensitive information from leaking out to other Internet sites. Social media sites are usually blocked by the Web Filter to protect corporate and other personal data from being leaked out by accident. Continue reading What is a Web Filter and Content Filter?

Data Breach – Why you should care and what you should do

What is a data breach?

  • A data breach is an incident where information is stolen or taken from a system without the knowledge or authorization of the system’s owner.
  • Victims of data breach are usually large companies or organizations and the data stolen may typically be sensitive, proprietary or confidential in nature.
  • Data breach may involve personal health information (PHI), personally identifiable information (PII), trade secrets or intellectual property.

Continue reading Data Breach – Why you should care and what you should do