1.800.219.7290 / Careers / About Us / Contact Us / Partner Login / Shop Online

Categories

Popular Tags

Archives

Our Authors

Subscribe

Recent blog posts
Not long ago, data security was a relatively predictable IT responsibility left in the hands of mid-level associates and administrators. Now that threats are coming in greater volume and variety, however, a number of CIOs are having to fundamentally rethink their protection of sensitive information ...
Hits: 348
0

Posted by on in Cloud
The simultaneous rise of consumerized IT, mobile devices and cloud computing has ensured that sensitive corporate information is now reaching more people and more endpoints than ever before. As much as they would like to, risk management professionals cannot turn back the clock on this increasingly ...
Hits: 283
0
Health IT administrators have had to balance conflicting priorities in recent months as internal stakeholders push for greater innovation and industry regulators offer new data compliance mandates. Although there is no one-size-fits-all approach for equitably allocating resources toward these two ob...
Hits: 467
0

Posted by on in Data Breach
Data breach scenarios are the stuff of nightmares among IT security professionals, but logic tells them that it may only be a matter of time before their organizations fall victim to an external attack or internal mistake. When disaster strikes, the degree of damage is often dependent on how teams h...
Hits: 212
0
The U.S. Department of Health and Human Services (HHS) released a long-awaited addendum to the Health Insurance Portability and Accountability Act (HIPAA). The four previous provisions combined to create the comprehensive new rule, which is intended to bolster patient privacy protections while simul...
Hits: 290
0