You can’t read about cybersecurity without coming across an article with the author singing the praises of a SIEM or Security Information and Event Management setup. A SIEM is certainly a worthy tool in your cybersecurity arsenal but before you jump into one,...
The United States National Institute for Standards and Technology (NIST) 800-63(b) publication was updated to reveal a very important change. One of the more fascinating examples is not relying on complex passwords. This has been an interesting read. I highly...
Security isn’t just a tech issue. If you go into thinking your gear is your security program, you’re leaving yourself open to hurt. Tech toys can’t solve all security problems. A lot of the obvious problems can be mitigated with simple configurations...
We started the HIPAA discussion with a brief intro back in late 2015. Late in the following month, we continued the discussion with a deeper dive into HIPAA. Now let’s test the bounds of the “P” in HIPAA by looking at HIPAA data cloud requirements!...
There are probably a ton of cybersecurity implementation myths. Here’s the big 4: 1 If we focus on security, we won’t be able to accomplish as much. Security doesn’t have to compromise productivity; it can be part of it. Think of vetting devices, solutions, or...
HIPAA, the Health Insurance Portability and Accountability Act, defines patient rights and standards for protecting health information. We briefly explored this topic in the post Exploring Regulated Information: HIPAA Data back in December. Now let’s go into a...
The Department of Homeland Security (DHS) defines cybersecurity insurance [1] as guaranteed coverage for a variety of cyber incidents. This topic can go pretty deep but this post will briefly cover cybersecurity insurance basics. The types of cyber incidents this...
It’s always good to keep your door open to constructive criticism when creating documents or anything else for that matter. Sometimes you get amazing feedback and sometimes you just get noise. I’m sure you’ve experienced both ends of the feedback...
PCI is the Payment Card Industry. The most common standard they provide is the PCI Data Security Standard (PCI DSS). The information this standard protects is considered PCI data. The basic premise is that all cardholder data and sensitive authentication data must be...
This site, Davis Tech Media, is owned and operated by Davis Tech Media LLC, a limited liability company headquartered in Florida, USA. Davis Tech Media is a participant in the Amazon Services LLC Associates Program. As Amazon Associates, we earn from qualifying purchases at no additional cost to you. Davis Tech Media will also participate in affiliate programs with Udemy and other sites. Davis Tech Media is compensated for referring traffic and business to these companies.