Bite Size Security Blog
Keep your business secure with the latest cybersecurity and information security news from NCX Group. Our team of experts provides you with analysis and insights on potential threats to help protect your enterprise.
Get informed and stay safe with NCX Group.
Bite Size Security Blog
Keep your business secure with the latest cybersecurity and information security news from NCX Group. Our team of experts provides you with analysis and insights on potential threats to help protect your enterprise.
Get informed and stay safe with NCX Group.
Latest Updates
Obama’s Executive Orders: What They Mean to Healthcare Information Security
Although President Obama’s executive orders address gun control, seven out of the twenty-three cover mental health reporting. Out of the seven orders, order number two has a direct impact on HIPAA and the security of healthcare information as a whole. The seven...
The WatchDog Report – InfoSec in 16 Minutes
In this episode we touch on many of the key points of information risk with Congresswoman Mary Bono Mack, Former ACE Hardware CIO, Paul Ingveldson, SR. VP. of InfoSec, Bill Stevenson and leading Data Security Researcher Dr. Larry Ponemon. By the end of this interview...
2 Security Measures to Protect Medical Devices From Breaches
An area that also requires security measures in a healthcare organization’s work environment and for patient protection are medical devices. This particular focus is sometimes not a primary concern because the assumption is that the software companies who create the...
WatchDog Report: Interview with Mel Holstrom ~ Cloud Security, Managed Security Services and Threat Management
Interview with Mel Holstrom, is from the Best of The Watchdog Report. During the interview we discuss managed security services, cloud security and threat management. By the end of this interview you will gain insight into incorporating the benefits of...
Medical Device Risks and Network Security
When it comes to security breaches and healthcare organizations, sensitive data isn't the only aspect executives and CIOs have to worry about; medical device risks are also included. Device vulnerabilities have the potential not only to divulge sensitive data, but...
The Watch Dog Report – Interview w/Dr. Larry Ponemon, The Cost of a Data Security Breach
Interview with Dr. Larry Ponemon, is from the Best of The Watchdog Report. During the interview we discuss the Cost of a Data Security Breach. By the end of this interview you will gain insight into the expense of a Data Security Breach and the impact to your...
3 influential components of information security risks and BYOD
The ownership of external devices that have access to sensitive company data is one of the biggest problems with information security and the use of BYOD in the workplace. Devices are controlled by the owners; the devices can be lost, stolen and work on...
The Watch Dog Report – Threat Management
Interview with Dr. Gene Schultz, is from the Best of The Watchdog Report. During the interview we discuss intrusion detection and threat management. By the end of this interview you will gain insight into incorporating the benefits of Threat Management into your...
BYOD information security risks and solutions
BYOD and data security was one of the major topics discussed at the RSA Conference. The high interest in this topic stems from the unstoppable and growing BYOD trend in the workplace and the information security risks involved. Multiple types of facilities such as...
The Watch Dog Report – Use InfoSec to Gain New Business
Interview with Paul Ingevaldson, the former CIO for ACE Hardware, is from the Best of The Watchdog Report. During the interview we discuss how you can leverage InfoSec to drive new business and grow revenue. By the end of this interview you will gain insight...
5 steps for information security and risk management optimization with the cloud
More and more organizations are using cloud applications and services for its benefits. Knowledge of information security and risk management preparedness when using the cloud can avoid a major business catastrophe (which not only entails the leakage or loss of...
Information Security – Governance, Risk and Compliance for today’s businesses
Interview with Paul Reymann, CEO of the Reymann Group, is from the Best of The Watchdog Report. During the interview we discuss Governance, Risk and Compliance for today's businesses. Paul is best known for his work in the security rules for GLBA.By the end of this...
The Employee Problem and Data Breach Risks
Data breaches become an automatic risk due to the necessary components of a company’s existence (employees, business providers and partners). Every organization functions on the basis of teamwork and in order to do a job well, all parties involved need access to...
Overcoming barriers to a strong defense against data breaches
Strengthening data security to protect clients’ privacy is not an easy task, but it is a ‘must do’ to avoid business losses. There are at least three top barriers to a business’ success in implanting a strong information security plan: technology, resources, and...
How to save your business millions when data security compliance isn’t enough
Thanks to instituted regulations businesses such as healthcare organizations, universities, and data centers are implementing actions to secure their private and sensitive data. However, although compliance is great, it isn't enough. According to a recent study...
WatchDog Report: How To Build an InfoSec Program
Interview with Bill Stevenson SR. VP of InfoSec w/IndyMac Bank, is from the Best of The Watchdog Report. During the interview we discuss the building blocks of developing an effective security program within your business. At the end of this interview you will...
Security Assessments Are Missing the Mark
Security Assessments Are Missing the Mark. Unfortunately, Compliance does not equal Information Security; preparation and evaluation does. Are you at Risk? Research shows security assessments focused solely on compliance requirements like (PCI, HIPAA, SOX etc…)...
Is your InfoSec Prepared for the Challenges of 2013?
With the new mandates put in place by ObamaCare, information asset protection will be even more important in 2013 than ever before. The mandates are already causing businesses to trim jobs. More than 120,000 jobs have already been lost since the 2012 Presidential...
Best of Watchdog Report: Rep. Mary Bono Mack ~ Infosec & the Legislation Process
Interview with Congressional Representative Mary Bono Mack, is from the Best of The Watchdog Report. During the interview we discuss Cyber Crime, Hackers, Intrusions Malware, Spyware, Botnets and the Legislation Process in DC. At the end of this interview you will...
InfoSec Podcast: Interview with Wes Hsu United States Attorney
Best of the Watchdog Report: Interview with United States Attorney Wes Hsu At the end of this interview you will gain insight into many of the InfoSec threats businesses face everyday and the cases that are being prosecuted in the court system. Be sure to follow the...
Don't Be Shy.. Get In Touch.
If you are interested in working together, send us an inquiry and we will get back to you!