Protecting Your Business’ Most Sensitive Mobile Data Gone are the days of the rotary phone. Data is immensely portable. As we — individuals, consumers, corporate employees, investment advisors and financial investors — continue to rely on our mobile devices for everything, the level and amount of sensitive data that is stored on our mobile devices [...]
Welcome back to SEC Cybersecurity Guidance: Business Continuity Planning. The first steps (found here in Part 1) are: List your Specific Needs, and Discuss and Document... and here, in Part 2, we talk, and plan, and test. Disclaimer: we are STILL not lawyers. We are cybersecurity practitioners who work with a lot of registered [...]
It's a good idea... We have a lot of conversations with our clients about cybersecurity insurance. Adelia Risk doesn't sell cybersecurity insurance. Instead, we provide a holistic cybersecurity service to small, high value, heavily regulated firms. As part of providing our service, cybersecurity insurance is a common topic. The single biggest misconception that we see? [...]
Website hacked? Are you worried that it might be? More importantly, would you even know if it is? Are you a website hacking target? You might think that your business is too small to be hacked. Think again. You’ll be blown away by these stats, courtesy of a terrific article by Joey Song: [...]
Do you know all of the ways someone can steal PHI from your practice? We've put together a list of 24 ways that people can steal medical data.
Firing an employee, or having an employee leave voluntarily? Use this list of 28 measures to keep your business safe.
Why is it important to have a secure laptop? Losing a laptop or having one stolen can be disastrous for any business. Not only will it leave you unable to work until you find a replacement, but if the laptop has Personal Health Information (PHI) on it, you might have to report a breach under [...]
Figuring out how to avoid a security breach can be overwhelming. There are hundreds of ways that hackers, patients, and employees can steal data if they want, and most organizations don't have the time or money to try to address all of them. Luckily, we can learn from the mistakes of others! "You must [...]
Companies that need to comply with privacy laws like HIPAA, PCI, GLBA, etc. need to worry about data loss prevention tools. “Data loss prevention” typically refers to preventing employees from deliberately stealing or accidentally leaking sensitive data. The typical stack to data loss prevention tools include: Blocking or monitoring USB drives Blocking or monitoring CD/DVD burners [...]
The first step in performing a HIPAA security risk assessment is to be sure you understand what Protected Health Information (PHI) your practice has. Here’s how Wikipedia defines PHI: “Under the US Health Insurance Portability and Accountability Act (HIPAA), PHI that is linked based on the following list of 18 identifiers must be treated with special care: [...]