- By July 2nd, 2014Read More »
Editor's Note: This is the second of a three-part series on industry cyber security reports, covering an additional three vendor data summaries. Click here for Part I, covering four data summaries. Part III of the series will cover industry surveys and will be available July 14.
- June 24th, 2014Read More »
When it comes to HIPAA compliance and cyber security, your business associates are as much your organization as your own employees. In a June 26 presentation to the North Carolina Healthcare Information & Communications Alliance, Phyllis Patrick & Associates Founder and President Phyllis Patrick and NJVC Cyber Security Principal Robert J. Michalsky explained how your organization can implement an effective training policy, and why truly effective cyber security is about much more than HIPAA compliance.
- June 23rd, 2014Read More »
Editor's Note: This is the first of a three-part series on industry cyber security reports. Part I discusses their importance and covers four data summaries, Part II covers an additional three data summaries and Part III covers industry surveys.
- June 11th, 2014Read More »
The U.S. military, like other federal government entities, is transitioning to the cloud due to a variety of critical factors, particularly mission interoperability and diminishing budgets. However, military IT decision makers still have many questions impacting the pace of migration.
- What are the real benefits of the cloud?
- When is it best to move to a private or public cloud environment?
- What are cloud service brokers and what role do they play?
- May 6th, 2014Read More »
Anyone who ever told you not to judge book by its cover never picked up a copy of Verizon's latest Data Breach Investigations Report (DBIR).
The 2014 edition of the benchmark yearly volume covers 57 pages of text and 1,367 discrete breaches among 63,437 security incidents in 2013, yet the most important two numbers are lifted right from the cover: 92 and nine.
Of the more than 100,000 incidents investigated in the decade Verizon that has published the report, 92 percent fall within nine attack patterns.
- April 11th, 2014Read More »
The most important element in a successful cyber security career will never be found in a position description, directly evaluated during a year-end review or taught in a college course.
Nothing trumps passion for the subject matter and passion for continuous learning.
- March 10th, 2014Read More »
Chuck Norris doesn’t need cyber security. His IT enterprise sits behind his own custom-built firewall. Or as you probably call it, the sun.
Norris, the consummate tough guy who did for roundhouse kicks to the chops what Microsoft did for operating systems, celebrates his 74th birthday today (or, more accurately, as one Twitter wag posits, 74 celebrates its association with Chuck Norris). The happy occasion lit up social media as well as our cyber security staff meeting with proposed new Chuck Norris facts.
- February 23rd, 2014Read More »
The winter games have always been a frozen classroom of great life lessons.
In 2014, we learned that sport is again the finest form of diplomacy, that the combination of athleticism and artistry calibrated by gravity is nothing short of awe-inspiring and that all hotels in Sochi are apparently managed by Norman Bates' holding company.
- February 13th, 2014Read More »
Candy hearts are a Valentine's tradition. So too should regular checks of your cyber security posture be a regular tradition for your IT enterprise.
So, to meld one great one tradition with another, NJVC offers seven cyber talking points in candy heart form.
We don't advise printing them out and eating them. Then again, you might not be able to tell the difference.
- February 6th, 2014Read More »
Meeting HIPAA regulations is a requirement for HIPAA compliance, but as NJVC Cyber Security Principal Robert J. Michalsky said at the 22nd National HIPAA Summit, it's only a start. To protect patient data with the same zeal doctors protect their well being and avoid HIPAA-violating breaches, healthcare provider organizations must adopt a holistic cyber approach, starting with simple cyber hygiene. Review the slides of his presentation below.