888-448-5451 [email protected]
Are there gaps in your data protection?

Are there gaps in your data protection?

As networks expand and evolve, so do the attack vectors and the need to ensure you do not have any gaps in your network. Furthermore, virtual environments have increased due to the fact that most IT groups have been asked to do more with less. This request comes at a price and IT professionals are worried about the protection of their information assets. Solomon recommends three ways to help reduce and address these concerns.

3 ongoing tasks for the CIO to reduce data breach risks

3 ongoing tasks for the CIO to reduce data breach risks

Protecting your facility’s information from breach faces a good deal of challenges. In the past few months various organizations have had their data compromised, like the University of Virginia or the Office of the Medicaid Inspector General. This is a clear statement that institutions and their CIOs are still in great need of a strong information security plan; or for sure that they have yet to establish a security strategy and system to suit their needs.

How Secure is Your Web Application?

How Secure is Your Web Application?

One of the best ways to check the security of your web-based applications is to check the Open Web Security Application Project (OWASP) Top 10 List. The OWASP has been the basis for a security checklist for ten years now. Did you know the OWASP updated their Top 10 list this year? How often do you look for the Top 10 risks in your web-based applications?

3 Things That Keep the CIO Up At Night

3 Things That Keep the CIO Up At Night

The CIO has big responsibilities when it comes to managing a facility’s network security and IT team. Ensuring financial or data losses do not take place are constantly in the forefront of any decision the CIO must make. But what is the breakdown of some of these...