
Rioting In The Suites – InfoSec Impacts of a Presidential Election
Over the last 6 months CEO’s, Executive Boards, and Small Business Owners alike have been making Strategic Plans for a Romney Victory and for the Re-Election of President Obama. It has been said that elections have consequences, and if recent reports...
The Non Sexy Sister ~ Business Continuity
Although network security and information security are the new sexy terms in information technology, they are not the only terms to consider. Business continuity may be the non-sexy sister, but without a business continuity plan, a business may be only one disaster away from ruin.

Who is on Medical Data Security Detail?
Since the introduction of the HITECH Act in 2009, the business of protecting patient data has reached a level of critical importance. With severe civil and criminal consequences, HIPAA now has the teeth to punish those who do not protect patient data. Coupled...Medical Identity Theft ~ A billion dollar crime
Medical identity theft occurs when a patient’s personal medical information is stolen and used by a thief to fraudulently receive health care services. Medical identity thieves can use patient information to have surgeries, get medical treatments, pay for...