Cyber vs. Physical Security

Cyber vs. Physical Security

Forty years ago, cybersecurity and physical security were two very separate things. A thief going after a physical asset didn’t have to overcome a digital obstacle to get it. But today, they’ve fused together in a way that’s vital for business owners to remember. In...
What is Identity Governance?

What is Identity Governance?

Identity governance is the policy-based coordination of user identity management and access control. It’s crucial to both IT and regulatory compliance. Why is it so important? “The world of governance is about who has access to what, who should have access to what,...
June Cybersecurity Report

June Cybersecurity Report

Facial Recognition use on U.S. borders in 2018 DSLR cameras armed with a variety of sensors will be used to get a clear shot of any driver crossing U.S. borders. Customs and Border Protection plan to have it ready to go this summer. Australia forces Facebook and...
Evolution of the NIST Framework

Evolution of the NIST Framework

  The National Institute of Standards and Technology (NIST) developed a framework consistent with their mission to promote U.S. innovation and industrial competitiveness. This cybersecurity framework is continually advancing. But where did it all start? February 12th,...
Texting in Healthcare

Texting in Healthcare

Texting in Healthcare In December of 2017, several hospitals received a letter from The Centers for Medicare & Medicaid Services (or CMS) stating that texting in a clinical setting is not approved, even on “encrypted” or “secured” texting platforms. A number of...