BLOG

What is Risk? A Video Overview

What is Risk? A Video Overview

For more information or to speak with our Advisory Services Division, call (877) 369-1831 or email us at info@dfcyber.com. You might find our latest white paper helpful. Download it free...

The Evolution of Risk Management

Risk evaluations along with risk management are a must for any organization who wants to thrive in today's market. As many organizations grow and move into different geographical locations, additional considerations targeting specific locational risks need to be taken...

July 2018 Cybersecurity Recap Video

Cyberattacks in Finland Surge During Trump-Putin Summit Attackers targeted IoT devices like they did during Trump’s June meeting with North Korea’s Kim Jong-un, but this time China was the top-attacking nation. Three Hacking Attempts Made on Midterm Elections...

Why Hackers Target Healthcare

It seems like we hear about a new cyber attack on a weekly basis, and chances are these attacks are being aimed at the healthcare industry. But why is the healthcare industry such a sought-after target? They hold a trifecta of information which translates to big $$$...

Phishing-Look for these Warning Signs

Don’t be hooked! Phishing is a method used by scammers to steal information through social engineering and fraud. The information stolen can be used for simple monetary gain or even up to identity theft. Spear Phishing Spear Phishing is a direct and targeted form of...

HIPAA Calls for a Renewed Commitment to Physical Security

With the development of so many cyber threats involving healthcare providers and business associates recently, many organizations are hyper-focused on controls set out by the HIPAA Security rule regarding cybersecurity. This has led to many...

Cyber vs. Physical Security

Forty years ago, cybersecurity and physical security were two very separate things. A thief going after a physical asset didn’t have to overcome a digital obstacle to get it. But today, they’ve fused together in a way that’s vital for business owners to remember. In...

2018 Summer Cybersecurity Vacation Tips

When on vacation, digital security is likely not at the forefront of your mind. Cyber-criminals know this too! Here are five simple steps to keep your security while traveling. USE A VPN: While on vacation you are more likely to use public Wi-Fi, and a VPN can help...

What is Identity Governance?

Identity governance is the policy-based coordination of user identity management and access control. It’s crucial to both IT and regulatory compliance. Why is it so important? “The world of governance is about who has access to what, who should have access to what,...

Five Signs That You Might Have Identity Governance Issues

It’s still quite common for IT and security professionals to be in a state of discord with managers and higher-ups within the departments of an organization. Despite the escalation of cyber risks, with an astounding percentage of those caused by malicious insiders,...

June Cybersecurity Report

Facial Recognition use on U.S. borders in 2018 DSLR cameras armed with a variety of sensors will be used to get a clear shot of any driver crossing U.S. borders. Customs and Border Protection plan to have it ready to go this summer. Australia forces Facebook and...

Training Your Employees When New Guidelines Come Out

  The OCR recently released “new guidance on HIPAA and individual authorization of uses and disclosures of protected health information (PHI) for research.” This new guidance further explains: Determining factors of whether a description was sufficient for...

HHS wall of shame

Find out who is non-compliant and how to stay off the naughty list

Blog

Read up on what's happening in the compliance realm

Report a Breach

Engage our cyber defense team

Forge LMS

Take a look at our other services