by Brian Allison | Mar 19, 2017 | Security
The cyber security firm Nuix compiled a recent report, ironically called the Black Report, based on interviews with active so-called “White Hat” hackers. White Hat is used here in the context of someone that’s doing ethical work at the invitation of their...
by Brian Allison | Aug 12, 2016 | Security
U.S. Dept. of Health & Human Services issues cybercrime guidance for HIPAA compliance Summary: Titled “Your Money or Your PHI: New Guidance on Ransomware,” the HHS Office of Civil Rights blog site points to an 8-page fact sheet to help healthcare entities better...
by Brian Allison | Dec 29, 2015 | Security
Computer Security: The Bulls and the Bunnies By: Brian Allison, December 29, 2015 When it comes to computer security, are you an angry Bull, ready to defend what’s yours, or more like a cute and defenseless Bunny? To find out, let’s explore the problem, and then...
by Brian Allison | Nov 4, 2015 | Data Management, Security
A recent advertisement on the dark web demonstrates the ambition of the creator of a particular variety of the malignant software known as Ransomware, which encrypts the files of an infected system or network and holds the decryption key as ransom. There is now an...
by Brian Allison | Apr 13, 2015 | Business Continuity, Data Management, Security
One of the worst things you can do as an employee is un-securely store your company’s corporate data on Cloud based systems. While it doesn’t seem to be the case considering how Cloud services advertise their ‘security’ and ‘data integration’ features, the fact is...
by Brian Allison | Mar 17, 2015 | Business Continuity, Network & System Performance, Operational Efficiency, Security
There is never a good time to get a virus on your server or workstation. Likewise, downtime for predictable hardware failures or conflicting software updates never happens at a convenient time. Generally, it’s quite the opposite. You’re in a hurry to get that...