5 Reasons Your Company Should Monitor its Employees’ Computers

5 Reasons Your Company Should Monitor its Employees’ Computers

  And Not Just to See If They’ve Been on Facebook   Compliance Many industries have data and employee monitoring requirements, requiring log collection and monitoring systems which provide an audit trail of all access and activity to sensitive business information. One of the most well known is HIPPA, the US healthcare industry legislation which provides data privacy and security provisions for safeguarding medical information. American financial services are regulated by SOX, a series of regulations enacted in response to…

Read More Read More

WannaCry & the Blame Game

WannaCry & the Blame Game

WannaCry and the Difficult Task of Preventing a Similar Attack The first wave of the ransomware attacks that inundated businesses around the world last week has apparently now passed, although it’s quite possible more infections will occur. The finger pointing continues between the infected institutions and the companies and governments they believe could prevent outbreaks: Microsoft, the NSA, Russia, and even North Korea. But who is to blame? Like most things, everyone is at least partly responsible. The real question is…

Read More Read More

The Effects of Patient Access to Data Cybersecurity

The Effects of Patient Access to Data Cybersecurity

Benefits vs. Consequences of Increasing Patient Power Over the past few years, there has been a shift in national healthcare systems to provide patients with greater access to their own medical records. Legal and technological trends have also granted patients more convenient access to medical records via the internet. As of 2017: United States: The Health Insurance Privacy and Portability Act (HIPPA) stipulates that patients must be permitted to review and amend their medical records. (1) United Kingdom: British GPs…

Read More Read More

Cybersecurity in the Healthcare Sector: Securing Sensitive Cloud Data

Cybersecurity in the Healthcare Sector: Securing Sensitive Cloud Data

The number of American healthcare data breaches almost doubled in 2016, averaging more than one data breach per day in 2016 for a total of 450, up from the 253 breaches that took place in 2015. (1) The 2016 Data Breach Incident Report describes healthcare as one of the most affected industries by cybersecurity threats, both insider and privilege misuse. (2) Half of the breaches were caused by insider threats and the remaining were from external forces which included hacking. It is…

Read More Read More

The Cloud and the Need to Monitor User Activity

The Cloud and the Need to Monitor User Activity

With the advent of server virtualization and cloud technology, there has been a need to monitor user activity. Clean Rooms & Mainframes Computing technology has come a long way. Its early beginnings started in clean rooms filled with large, ceiling high mainframe computers. A separate room lined with rows of terminals on tables was for user access. Pull up a chair and log in remotely to the mainframe for your own personal computer account. You shared the system with dozens of other users, each being…

Read More Read More

Welcome to our blog!

Welcome to our blog!

  Welcome to our first post InfoDigest Digest! This is a blog where we will discuss all the latest happenings in the cybersecurity world. In future posts, we will discuss monitoring user activity, data security and HIPPA, technological vulnerabilities in the financial sector as well as technical how-tos!