-
Minimizing Risk: Completing a HIPAA SRA and Penetration Test to Strengthen your Security
Join Netgain’s VP of Healthcare, Dave Stalder and Senior Director of Intraprise Health, Toby Morrison for this webinar to discuss how to minimize risk by completing a HIPAA SRA and penetration…
-
Cybersecurity Concerns Should Scare You Into Action
October is Cybersecurity Awareness Month and it’s no coincidence that Halloween shares the same month because both can be pretty scary. However, just like with Halloween’s haunted houses and dark…
-
IT Security Demystified
During this webinar, we will demystify the IT security layers required to mitigate risk and improve your firm’s security posture. We will address security for firms housing data and applications…
-
A Primer on Vulnerability Management
You are a business that stores data on your organization’s network and wants to keep the network as secure as possible. Protecting your business assets has become a complex challenge…
-
Three Tips on Why Multi-Factor Authentication is Critical to Data Security
Cybercrime is rife in 2022. Kaspersky released a new report revealing a growing number of cyberattacks on small businesses so far in 2022. Researchers compared the period between January and April 2022…
-
2022 RSA Conference – 3 Key Takeaways
According to this article by CRN about this year’s RSA Security Conference, “cybersecurity is now in ‘fast-forward’ mode where attendees are almost in awe at the transformation of the industry…
-
Security Lesson #7: The Essentials of Implementing Effective Perimeter Security
As I highlighted in my first post, no company or government agency is immune to cyberattacks, and these attacks are a growing threat to every organization. To protect against these attacks, you need…
-
Security Lesson #6: What Are Endpoints and How Do You Secure Them?
In our last post, we talked about application security and how the security measures at the application level prevent data or code within the application from being stolen or hijacked.…
-
Security Lesson #5: How to Think about Your Application Security Strategy
This is the latest post in our Security Lessons series. In my last two posts, I explained what data security is and outlined data security best practices. In this post,…
-
Top 5 Cybersecurity Trends in 2022: Pandemic-Level Ransomware, Talent Gap, Government Involvement, Threat Intel Availability, and more
It’s no secret that cybersecurity attacks and breaches have accelerated in recent years, but the growing impact and volume of such attacks has entered the public eye more aggressively than…
-
Security Lesson #4: Build Your Data Security Strategy on Best Practices
The data security layer is about protecting the data you have. It includes the different cybersecurity practices that you use to secure your data and prevent data breaches and misuse.…
-
Security Lesson #3: What Is Data Security (and Why It’s Important)
Data Security: Protecting sensitive data from unauthorized access In Security Lesson #1, we talked about the importance of a business impact analysis and the nine questions you need to ask…