by Matt Stuart | Feb 15, 2017 | Blog
On May 7, 2014 Chinese hackers gained access to the United States Office of Personnel Management (OPM) but the breach wasn’t discovered until April 15, 2015, and the breach wasn’t announced until June 2015. The attackers had access to the OPM servers for almost a full...
by Matt Stuart | Apr 6, 2016 | Blog
Overview The cybersecurity industry is an aggregation of products and services to protect computer networks from data confidentiality, integrity and availability. It’s vital to the health and continued functioning of the Internet and all connected organizations....
by Matt Stuart | Nov 9, 2015 | Blog
Overview Security of software products during both development and operations is vital and can effects national security, therefore the security control baseline selected will be ‘high-impact” criteria in NIST 800-53 based on the criteria in NIST 800-60 stating...
by Matt Stuart | Jun 11, 2015 | Blog
Introduction One of the foundational components of the security architecture is the management of identity credentials and authorization to interact with data. Currently the method is a manual paper-based system routed between the HR department...
by Matt Stuart | Mar 5, 2015 | Blog
Introduction In February 2017, Memorial Healthcare System (MHS) in southern Florida was assessed a $5.5 million penalty by the US Office of Civil Rights for HIPAA (Health Insurance Portability and Accountability Act) violations. The penalty was for “failure to...
by Matt Stuart | Feb 22, 2015 | Basics, Blog
Businesses must fulfill their legal duty to protect the confidentiality and integrity of data. Most industrialized nations and US states have legal requirements for data security(Brotby, 2009, p. 14). Failure to comply range from severe financial penalties to prison...