Image result for compliance week logo

How GDPR, CCPA impact healthcare compliance

| | All Blog Posts
Most healthcare organizations are familiar with the privacy and data security requirements of the landmark HIPAA, and then HITECH, so they have gotten their operations compliant long ago. This may lead people ...

It takes a village… To hack a plane, a car, or your pacemaker

| | All Blog Posts
This year’s 27th annual DEFCON security conference (has it really been that long?) saw the continued expansion of the “Villages” which are dedicated areas set-up for the hacking of specialized systems. This ...

What’s the most vulnerable part of your network?

| | All Blog Posts
Researchers at DEF CON demonstrate the most “vulnerable part of your network” could be your SSL VPN. Last Friday at the annual DEF CON and Blackhat security conferences, Taiwanese security researchers Orange ...

Vulnerable vendors make you vulnerable

| | All Blog Posts
Managing third-party vendors is a fact of life for many organizations, and one factor that is important to consider (yet often overlooked) is whether one or more of your vendors may be ...

4 steps to prevent a third-party data breach 

| | All Blog Posts
As the lessons learned from the LabCorp and Quest Diagnostic’s patient data hacks fade from our collective memory, we must remember that attacks on corporate health systems and government networks are occurring ...

What is secure remote access software?

| | All Blog Posts
Today’s business environment requires that your employees and vendors have access to your company’s network and applications regardless of where they are or what device they are using. More and more business ...

How are VPNs and remote access software priced?

| | All Blog Posts
Deciding which remote access solution to use is not a simple or quick decision for most people, and it doesn’t matter if you work in a large enterprise, a midsized organization, a ...

How do I manage my vendors efficiently?

| | All Blog Posts
Businesses increasingly rely on vendors to make their operations run smoothly and efficiently. And because of this, many companies have migrated essential business operations to a cloud-based infrastructure. Although this outsourcing makes ...

Remote access solutions: Which is the most secure?

| | All Blog Posts
Many organizations face the need to give one or more third-party vendors, as well as employees, remote access to their internal resources. When addressing the need to provide internal (employee) and external ...

How much do Privileged Access Management (PAM) solutions cost?

| | All Blog Posts
Privileged Access Management or PAM solutions are a relatively new breed of tools that allow you to manage credentials with advanced permissions. It’s vital to properly monitor and secure these accounts because ...
Loading...