Cybersecurity and HIPAA
The HIPAA regulation is a rather expansive regulation. With all of the aspects HIPAA has to note for the of the different environments and cases encountered, including the administration, technical, and physical security issues to be addressed, it is almost surprising this regulation is not longer. As important as HIPAA and securing the medical data, information, and records are, the scrutiny of the HIPAA-applicable enterprise needs to grow in depth and width. Presumptively t
Cybersecurity and Churches
As with so many other non-profits, churches likewise have been listed as a target for attackers. This issue has been exasperated due to churches, along with other non-profits, having issues with cash flow and budgetary constraints. For the church’s management structure, purchases of tangible assets may be a much less daunting task. With cybersecurity having such a new focus in mainstream IT and industry, describing what needs to be done, why the project needs to be done, and
Cybersecurity and Private Data
Data in its various forms have distinct value. The value is to the owner of the data in that if it were to leave the company in an unauthorized manner (insider or external), the liability would be rather substantial. There is a value to the person whose data is described. If a consumer’s data is stolen, they have years and years of issues and worry regarding identity theft. Most pertinent, there is a value to the attacker who has successfully breached the system and secured t