Android security audit: An 11-step checklist

Read JR Raphael’s 11-step checklist for businesses to protect their Android smartphone/tablets on Computer Weekly : Android security is always a hot topic on these here Nets of Inter — and almost always for the wrong reason. As we’ve discussed ad nauseam over the years, most of the missives you read about this-or-that super-scary malware/virus/brain-eating-boogie-monster are overly […]

What Are Basic, Essential Healthcare Cybersecurity Measures?

With October being National Cybersecurity Awareness Month (NCAM), OCR highlighted top healthcare cybersecurity measures that all covered entities and business associates should keep in mind. Read about the basic and essential cyber security measures for healthcare firms according to OCR on Health IT Security.

What is the NIST Cybersecurity Framework and Can It Benefit Your Small Business?

Read Rob Starr’s explain how NIST cyber security framework can benefit small and medium businesses on Small Biz Trends : Understanding best practices when it comes to cyber security is just as important to a small business’s bottom line as a good product. Being hacked or otherwise compromised can drive up costs, decimate profits and […]

Federal guide aims to help small providers tackle cybersecurity

The National Institute of Standards and Technology has just released new guidance on the information security fundamentals for small businesses, including small physician practices, across the nation. Read about the new guidance for small and medium enterprises issued by NIST on Healthdata Management.

WP29 guidelines on personal data breach notification under GDPR

The Article 29 Working Party this week published draft Guidelines on personal data breach notification under GDPR. The relevant GDPR provisions are often misrepresented, and in many respects leave matters open to interpretation – a good or bad thing depending on the day. Read about the new data protection guidelines under GDPR published by Article […]

Notifiable Data Breaches Scheme: draft guidance materials demonstrate that preparation is paramount

Read David Benson and Sam Fiddian explain the new data breach guidelines issued by Office of the Australian Information Commissioner (OAIC) on Lexology : On 29 September 2017, the Office of the Australian Information Commissioner (OAIC) released its latest tranche of draft guidance materials. Those materials provide greater clarity as to the OAIC’s expectations of entities which […]

NIST issues ‘next-generation’ draft guidance for IoT integration

The National Institute of Standards and Technology (NIST) has issued its fifth revision of security and privacy guidance that includes a new focus on Internet of Things vulnerabilities. Read about the new NIST guidelines for Internet of Things integration on Fierce Healthcare.

Improve Healthcare Authentication with New NIST Guide

NIST recently released updated digital identity guidelines for federal agencies looking to create a secure authentication process. While not designed for healthcare authentication specifically, the guidelines could help the industry ensure a more secure password process. Read about the newly updated digital identity guidelines for healthcare firms by NIST on Health IT Security.

Gaps found in Pentagon guidance on Internet of Things devices, overall cybersecurity

A government agency has found there are gaps in the Department of Defense’s policies on new Internet-capable devices such as smart TVs and also suggests cybersecurity efforts “can be strengthened.” Read about the new report by Government Accountability Office which found gaps in the Pentagon’s Internet of Things cyber security guidelines on CNBC.

Guidelines for Best-in-Breed Data Center Security

Data centers that are groups of network computer servers for remote storage, processing, or distribution of large amounts of data have evolved as the blood and bone of today’s organizations. With a plethora of equipments such as database servers, load balancers, storage systems, redundant power supplies, environmental controls, and security devices, data centers play a […]