Wireless Security – 5 Quick tips for securing your Wi-Fi

This article points out just a few items which must be addressed when you have a wireless network. Although the following can apply to your home network, this information is most useful for businesses and home-offices. 

So, what are the immediate items which must be addressed with your new or existing wireless network?

1. First and foremost:

Your network should never be set to "open". An "open" network is a security risk as anyone that can see your network, can connect to it without any challenge and can immediately start "snooping" around, capturing usernames and passwords, and more.

Continue Reading: Wireless Security – 5 Quick tips for securing your Wi-Fi

HIPAA compliance when staff work from home

There are many benefits of allowing staff to work from home but there are many risks too. The Office for Civil Rights (OCR) has fined many companies that have not properly managed this process.

An employee losing equipment and data containing Protected Health Information to theft while traveling cost one company hundreds of thousands of dollars in fines. Courts have ruled against companies that do not have the proper policies in place to protect information.

Here are some best practices for permitting working from home or on the road:

Continue Reading: HIPAA compliance when staff work from home

5 essential steps leaders can take to improve cybersecurity

1. Engage the C-suite and the board Senior leaders driving the business must take ownership of cybersecurity policies and practices, …. Setting a top-down strategy to manage cyber and privacy risks across the enterprise is key …

Continue Reading: 5 essential steps leaders can take to improve cybersecurity

Did You Just Hire A Cybersecurity Threat

It has become increasingly important to conduct information security training immediately if not before, a new employee has access to corporate systems.

 … all it takes is one person clicking one rogue attachment to infect an entire network with ransomware.

Continue Reading: Did You Just Hire A Cybersecurity Threat

Questions Your CISO Should Be Ready and Able to Answer

It’s well known that many people do not test recovering their data from backups to verify it will work in case it is ever needed. Many find the protection they thought they had was never there.

Likewise, management must routinely query what those entrusted with the cybersecurity of the organization know about current threats, and what they are doing to prevent a breach or destruction of critical data.

Continue Reading: Questions Your CISO Should Be Ready and Able to Answer

 

We love to talk about what we do. CONTACT US

All services provided under the direction of a Certified Chief Information Security Officer (C|CISO) and a Certified HIPAA Compliance Officer (CHCO).