Featured

Delano Collins
9 Apr 2019

On March 5th, the Federal Trade Commission (“FTC”) proposed amendments to the Safeguards Rule and Privacy Rule under the Gramm-Leach-Bliley Act (“GLBA”).  These amendments are significant in several ways. However, the most impactful will be the...

Read the Article
Additional articles

According to an October 2018 cybersecurity report by FutureWatch, organizations have made their needs clear about what they need from security providers.

Read the Article

HIPAA or the Health Insurance Portability and Accountability Act is a set of practices that govern the privacy of individual health records. You may have heard of data sets that would be covered under HIPAA such as Personally Identifiable Information, Electronic Protected Health Information, or Protected Health Information (PII, ePHI, and PHI).

Read the Article

In a recent SANS Survey of IT Professionals who voiced concerns about endpoint security, several alarming patterns emerged, all pointing to continued escalation of risk to organizations of every size.

Read the Article

Let us start by saying that the Dark Web can be a dangerous place for the inexperienced user. Drugs, illegal software, murder for hire, hacked user accounts and other illicit services are just a few of the things found there. As a business owner, you should also be concerned about where your data is at and who has access to it. A number of identity theft protection services and standalone providers are now offering “Dark Web” monitoring.

Read the Article

Get Your No-Obligation Consultation Today

CONTACT US