by Matt Stuart | Jun 11, 2015 | Blog
Introduction One of the foundational components of the security architecture is the management of identity credentials and authorization to interact with data. Currently the method is a manual paper-based system routed between the HR department...
by Matt Stuart | Mar 5, 2015 | Blog
Introduction In February 2017, Memorial Healthcare System (MHS) in southern Florida was assessed a $5.5 million penalty by the US Office of Civil Rights for HIPAA (Health Insurance Portability and Accountability Act) violations. The penalty was for “failure to...
by Matt Stuart | Feb 22, 2015 | Basics, Blog
Businesses must fulfill their legal duty to protect the confidentiality and integrity of data. Most industrialized nations and US states have legal requirements for data security(Brotby, 2009, p. 14). Failure to comply range from severe financial penalties to prison...
by Matt Stuart | Oct 18, 2014 | Blog
In the not so distant past, network and information security focused on securing the perimeter of the company. The increasingly advanced threats have shown that this strategy isn’t sufficient and that protection of the individual devices that the user interacts with...
by Matt Stuart | Sep 22, 2012 | Blog
Employees are vulnerable to social engineering attacks which are the modern day high tech confidence scams. In business, there is constant inflow and outflow of data and that information is controlled by solely by employee discretion. This is unavoidable, but it does...