by Maria Florio | Oct 7, 2013 | Blog
Do you know what happens when organizations opt to regularly monitor their networks to check the system’s security on an ongoing basis? Find three results from continuous monitoring that all business owners and executives will appreciate; as well as how an enterprise can implement continuous monitoring effectively.
by Maria Florio | Sep 30, 2013 | Blog
As facilities continue working on their HIPAA compliance requirements, there are more standards executives need to take into consideration and get ready for. This time what affects their everyday work is Obamacare. With Obamacare healthcare data security for individuals and facilities confront at least three challenges: the potential of identity theft, increased risk of vulnerabilities and breach, and breach reporting under HIPAA.
by Maria Florio | Sep 24, 2013 | Blog
A recent study focusing on the state of risk-based security management has found that only 46 percent of IT professionals have deployed continuous monitoring. Furthermore, many organizations that spend on perceived security risks, have not implemented preventive security technologies, and do not use audits often to identify security risks.
by Maria Florio | Sep 4, 2013 | Blog
In today’s marketplace the most valuable aspect of an organization, and sometimes the only things of value, is the information created, stored, and used to serve their customers and to be able to maintain a competitive advantage over their competitors. Many organizations have realized this and have allocated budget to systems to protect this data. The challenge is this only addresses one-third of the picture.
by Maria Florio | Sep 3, 2013 | Blog
The corporate culture of an organization has a huge impact on the success of your information security plan. It can help build a strong defense or make it weak and filled with vulnerabilities. Three of the biggest challenges organizations and executives face include: the level of threat perceived, location, and lack of cooperation and communication between executives and IT leadership. Overcoming these corporate challenges can help businesses secure their facility.
by Maria Florio | Aug 28, 2013 | Blog
As networks expand and evolve, so do the attack vectors and the need to ensure you do not have any gaps in your network. Furthermore, virtual environments have increased due to the fact that most IT groups have been asked to do more with less. This request comes at a price and IT professionals are worried about the protection of their information assets. Solomon recommends three ways to help reduce and address these concerns.