SEC Cybersecurity Guidance: Mobile Device Management

Protecting Your Business’ Most Sensitive Mobile Data Gone are the days of the rotary phone.  Data is immensely portable.  As we — individuals, consumers, corporate employees, investment advisors and financial investors — continue to rely on our mobile devices for everything, the level and amount of sensitive data that is stored on our mobile devices [...]

SEC Cybersecurity Guidance: Business Continuity Planning (Pt. 2)

Welcome back to SEC Cybersecurity Guidance: Business Continuity Planning.  The first steps (found here in Part 1) are: List your Specific Needs, and Discuss and Document... and here, in Part 2, we talk, and plan, and test. Disclaimer: we are STILL not lawyers.  We are cybersecurity practitioners who work with a lot of registered [...]

Do You Need Cybersecurity Insurance?

It's a good idea... We have a lot of conversations with our clients about cybersecurity insurance.  Adelia Risk doesn't sell cybersecurity insurance. Instead, we provide a holistic cybersecurity service to small, high value, heavily regulated firms. As part of providing our service, cybersecurity insurance is a common topic. The single biggest misconception that we see? [...]

Five Cheap Data Loss Prevention Tools

Companies that need to comply with privacy laws like HIPAA, PCI, GLBA, etc. need to worry about data loss prevention tools. “Data loss prevention” typically refers to preventing employees from deliberately stealing or accidentally leaking sensitive data. The typical stack to data loss prevention tools include: Blocking or monitoring USB drives Blocking or monitoring CD/DVD burners [...]

HIPAA Data Security – Find PHI

The first step in performing a HIPAA security risk assessment is to be sure you understand what Protected Health Information (PHI) your practice has. Here’s how Wikipedia defines PHI: “Under the US Health Insurance Portability and Accountability Act (HIPAA), PHI that is linked based on the following list of 18 identifiers must be treated with special care: [...]

By |2019-01-04T04:26:27+00:00September 6th, 2018|Data Breach, HIPAA|0 Comments