These top SecurityMetrics blog posts help you understand and implement some of the most foundational data protection principles. Our goal it to help you close gaps in security and avoid a data breach in 2019.
2019 is just around the corner, so it’s a good time to read up on important data security principles that will help you protect your data from cyber criminals next year. By mid-year 2018, the number of compromised records had already doubled compared to the same time in 2017, and the data breaches didn’t slow down after that.
What’s clear is that data breaches and cyber criminals are not going away, so bookmark these top SecurityMetrics blog posts to help you understand and implement some of the most foundational data protection principles. Our goal it to help you close gaps in security and avoid a data breach in 2019.
Firewalls are foundational network security.
As the first line of defense against online attackers, your firewall is a critical part of your network security. Configuring a firewall can be an intimidating project, but breaking down the work into simpler tasks can make the work much more manageable.
The guidance in this popular post will help you understand the major steps involved in firewall configuration:
Companies and individuals are often targeted by cybercriminals via emails designed to look like they came from a legitimate bank, government agency, or organization. In these emails, the sender asks recipients to click on a link that takes them to a page where they will confirm personal data, account information, etc.
This technique is called phishing, and it’s a way hackers con you into providing your personal information or account data. Once your info is obtained, hackers create new user credentials or install malware (such as backdoors) into your system to steal sensitive data.
As long as email users continue to click on phishing links, criminals will continue to send them. Social engineering phishing schemes are still a main cause of data breaches at businesses. This post gives tips to avoid becoming a victim of the latest phishing campaign.
See also: Fighting Phishing Email Scams: What You Should Know
Here is a rundown of our 7 tips to recognize phishing emails:
Because securing data within the Cloud is complex, having a standard set of protective controls is pivotal to keep your customers safe and avoid expensive data breaches.
In this post, we reviewed an incident from 2017 to demonstrate the breadth of security controls that should be established, as well as the difficult position in which any security event can place a business. Reviewing key controls gives you a specific path forward to secure your critical Cloud data.
In July 2017, Verizon experienced a security incident that made national headlines in the United States. While no hack took place and no customer information was taken, sensitive data was publicly exposed. A partner of the organization was using a data set from the telecommunications company to test and suggest changes to a self-service portal. A member of the third party's staff mistakenly set up the data’s cloud storage to permit external access.
This post goes into detail for six key cloud security controls in order to avoid such cloud-related compromises:
HIPAA compliance is rarely allocated the resources it requires. And this trend extends beyond just small organizations with limited security budgets. Lack of budget is a plague that affects risk and compliance officers at health organizations of all sizes.
How Much Does HIPAA Compliance Cost? gives you the information you need to more accurately plan your HIPAA budget.
See also: Five Things to Consider When Making a HIPAA Security Budget
The cost of HIPAA compliance depends on your organization. Here are a few variables that will factor into the cost of your overall compliance:
6 Phases in the Incident Response Plan teaches readers how to create their incident response plans and manage a data compromise; both critical aspects of any data security plan.
An incident response plan should be set up to address a suspected data breach in a series of phases. Within each phase, there are specific areas of need that should be considered.
The incident response phases are:
See also: 6 Steps to Making an Incident Response Plan
No one wants to go through a data breach, but it’s essential to plan for one. Prepare for it, know what to do when it happens, and learn all that you can afterwards.
Need help with a data breach? Talk to one of our Forensic Investigators.
Check out more top blogs of 2018!