For many of us in IT and system administration, the recent digital security misstep by GoDaddy, Google and Apple undoubtedly hits home. Every story like this gives us at least one lesson to think about. In this case, it’s recogniz [...]
Medical device manufacturers (MDMs) face pressures from many stakeholders -- shareholders, government agencies, healthcare delivery organizations (HDOs), electronic health records (EHRs), insurance providers, and of course patient [...]
It’s no secret that the healthcare industry is an ideal target for cyber criminals. Digital transformations are underway; the value of the data is immense; and while breaches in healthcare are generally higher than other industrie [...]
Since the beginning of the company, caring passionately about our service promise to our clients had been a hallmark of Certified Security Solutions (CSS) -- that's a big part of what made us successful for more than 15 years, sec [...]
Without always thinking about it, patients willingly share Personally Identifiable Information (PII) destined to live in electronic health records (EHRs) with their trusted healthcare providers. Maintaining this data is an immense [...]
As the Internet of Things (IoT) continues to grow and expand into new industries, there remains a gap between device manufacturing and security. Security is often an afterthought, and viewed as something that can be added to the d [...]
With cyber crime damage costs estimated to hit $6 trillion annually by 2021, there’s no doubt that cybersecurity continues to be one of the top concerns for IT departments in every industry. They’re constantly in search of more ro [...]
In an evolving cyber security landscape, defenses must continually evolve. Static systems are not only inherently insecure, they are less so with each passing day. This principle applies to cryptography as much as to other types [...]
Something is wrong in the broader Enterprise cyber security landscape. As a whole, organizations are devoting growing sums of cash to thwart cyber criminals. In 2018, international cyber security spending could reach $96 billion, [...]
There are clear parallels between home ownership and cyber security. Locked windows and doors as well as household alarms have cyber-analogs, of course, and are often used to help illustrate the importance of technologies such as [...]