Category Archives: Cybersecurity
The 18 Identifiers Of PHI
In this article I will outline the 18 identifiers of Protected Health Information also known as PHI. Under the Health Insurance Portability and Accountability Act, known simply as HIPAA, PHI is any information (identifiers) about health care, health status, or payment for health care that can be linked to a specific individual. THE 18 IDENTIFIERS…
Physical Security In The Workplace
With so much attention focused on securing networks and preventing phishing and avoiding ransomware attacks, the physical side of security sometimes goes overlooked. Even in the modern-day work environment where seemingly everything has an internet connection, we still must remain vigilant against physical threats to our security! KEEP THINGS ORGANIZED. It’s a lot easier…
New Password Guidelines
For the longest time, security experts have recommended long, complex, and sometimes random, passwords. Unfortunately, those guidelines create a dilemma for individuals and organizations alike. Of course, the more complexity you add to a password, the harder it is to crack. But a more complex password also means it’s harder to remember. Complexity often fosters…
LinkedIn Breach Exposes 92% Of Its Users Data
I’m shocked and upset about this LinkedIn breach. This is their second massive LinkedIn breach. It was reported that 700M users were effected in this breach, which is more than 92% of the total 756M users. The database is found for sale on the dark web, with records including phone numbers, physical addresses, geolocation data,…
Employee Guide To Spot Phishing Emails
If you didn’t know already, phishing is a social engineering attack that lands in your inbox with the intention of stealing personal info. Often times, phishing emails appear to come from a known contact (friends, family, co-workers) or an organization, such as a bank or credit card company. Attacks often feature malicious links or attachments…
Learn More About Social Engineering
Social engineering is a tactic used by attackers that takes advantage of people’s emotions in order to access sensitive or confidential information. It is very important to know who we are talking to and why the person needs the data. Always remain calm, do not respond immediately, and talk to your manager or the security…
Cybersecurity Without Paranoia
Not many people bring to light and discuss that there is a difference between paranoia and preparedness in cybersecurity. Due to many breaches and the various headlines we tend to promote 24/7 security awareness, although it is a simple understanding that scammers are everywhere and target everyone, this can cause paranoia. Prepare for security…
Cybersecurity Tips For Parents
Parenting is hard enough even before considering the challenges of online security. In this article I will give you five tips to help you with those challenges. Obviously, every household has different needs, so view these as a generic starting point, and make adjustments as necessary! Establish a culture of trust. Create a safe space…
The Future Of Identification And Authentication
IN THE BEGINNING… Passwords have been around since ancient times, back when you needed to know the correct word to pass or enter an area, and have evolved over the course of history to meet specific demands. The military developed a challenge and response system that required not just a password, but also a counter-password….
HIPAA For Business Associates
HIPAA defines business associates as a person or entity that provides services to a covered entity that involves the disclosure of PHI. What is HIPAA? HIPAA, the Health Insurance Portability and Accountability Act, was enacted in 1996 primarily to simplify the flow of healthcare information, and to make sure that all PHI (Personal Health Information)…