Computer Security
Secure Remote Access: Third-Party Risks
Some of the most infamous hacking incidents have arisen from third-party access to a corporate network that does not have secure remote access. Perhaps most infamously, the 2013 Target hack which compromised 110 million credit/debit cards used remote access granted... Read MoreTelework Security: Securing Home and Remote Workers
Telework Security: Securing Home and Remote Workers It goes by many names: Telework. Telecommute. Work from home. Remote work. According to recently released data from the US Census, 5.2% of Americans – 8 million people – worked from home in 2017. Home workers... Read MoreSaaS Providers can reduce HITRUST certification costs with HITRUST Inheritance Program
SaaS providers can reduce HITRUST certification costs with HITRUST Inheritance Program Vendors who use the Software as a service (SaaS) distribution model have enjoyed considerable success in the healthcare marketplace. A challenge that they face is increased... Read MoreCybersecurity Guide for DD Board Superintendents
Are you making the right IT security investments for your DD Board? Unsure of cyber risks or where to start? We have the guide you need.
Read More