1.800.219.7290 / Careers / About Us / Contact Us / Partner Login / Shop Online

Categories

Popular Tags

Archives

Our Authors

Subscribe

Subscribe to this list via RSS Blog posts tagged in Compliance

Posted by on in Compliance
Healthcare organizations are frequently victimized by data breaches. Cybercriminals target this sector due to the type of information on record - information such as names, addresses, Social Security numbers can be the starting point for a credit card fraud scheme. A recent presentation from consult...
Hits: 461
0
Virtualization is a highly effective method for increasing the efficiency and availability of physical IT infrastructures, and reducing traditionally high fixed infrastructure costs. According to leading research firms, as many as 95% of enterprises are using some form of virtualization. Today, orga...
Hits: 1570
0

Posted by on in Data Breach
The value of physical data backup methods is that they are frequently considered more secure than their virtual or web-connected counterparts. However, that logic may be giving organizations a false sense of security and raising the risk of information loss. One financial institution recently learn...
Hits: 1040
0
Yes, at face value “Bring Your Own Device” programs seem like an excellent deal…employee purchases wireless device, not us. But, not so fast, there’s a host of security and compliance costs associated with mobile BYOD. Typically, BYOD brings the iOS® iPhone® and iPad®, BlackBerry®, and Android™ tabl...
Hits: 1360
0

Posted by on in Data Security
Alarming Research According to the 2010 Annual Study: U.S. Cost of a Data Breach by Poneman Institute, a Michigan-based research center that studies privacy, data protection and information security policy, security breaches cost $214 per compromised record and average $7.2 million per data breach ...
Hits: 684
0