What role does encryption play in data security?

In part one of this series, we established the importance of encryption as part of your security strategy and discussed the different types of encryption, the challenges associated with each type of implementation, and provided recommendations to secure your data in transit. Now, let’s explore your options … read more


By 2022, the healthcare IoT will likely reach a valuation close to half of a trillion dollars. While many advancements push the connected healthcare market forward, ePHI (electronic protected health information) security remains a distinct challenge.


Discover the Growing Healthcare IoT Market

 Also known as IoMT (Internet of Medical Things), the healthcare IoT … read more

“Telehealth is a key part of value-based care and delivery, with the market expected to reach $30 billion by the end of 2020.”

Don’t miss the American Telemedicine Association (ATA) 2017 International Conference and Tradeshow, the world’s premiere event for the telehealth industry. Attendees, speakers, and vendors unite to learn from one another and, ultimately, … read more

What role does encryption play in data security?

Widespread connectivity creates many entryways for cybercriminals to hack your network. When data falls into the wrong hands, the consequences can be devastating. Accounting for all of the traveling data across your computers, mobile devices, databases and cloud systems is a serious challenge. Luckily, there are tried-and-true … read more

Spiceworks, a professional online community for the IT industry, publishes statistics, trends, and opinions annually. Study participants include approximately 900 buyers of IT-related products and services. This year’s research provides an analysis of available resources, technology adoption, and project trends. In the “Spiceworks 2017 State of IT” report, forecasts remain on par with the 2016 … read more

According to Gartner predictions for 2017, nearly a third of IT spending will happen in other departments; the perception is that IT is too slow and unwieldy, so operations outsource their IT needs. IT management requires a proactive, business-centric approach to work towards mutual company goals and create efficiency.

“You need to be clear on … read more

The day before April 1 is World Backup Day. Designed to inspire everyone to take data security seriously, this awareness event asks participants to take the backup pledge:

“I solemnly swear to back up my important documents and precious memories on March 31st.”

For individuals and businesses, routine backups offer protection against lost and stolen data. … read more

Every year, the scope and impact of cyber threats expand. E-commerce businesses must adhere to PCI DSS rules, but many choose to take further data security measures to build consumer confidence and minimize the effects of data breaches. Boutique sites and large retailers alike need current and compliant security measures to protect e-commerce sales in … read more

Preparation not only prevents breaches, but also minimizes the impact of a breach on your business operations. Here’s what to do if you’re in the midst of a breach.   

Experts say it’s no longer a question of if you will be hacked, but of when you will be hacked—and how quickly you can recover … read more

When it comes to colocation, shoppers have historically sought after inexpensive space and power. Today, that is not enough. Well-informed businesses should seek the most agile data center solutions with security measures that safeguard their infrastructure from cyber threats. As you review, update, and optimize your data center arrangements, consider what’s different about colocation services … read more

Trends in the digital threat landscape support the urgent need for strong data security foundations. With the publication of the “NTT Security SERT (Security Engineering Research Team) Q3 ‘16 Intelligence Report,” a few truths are emphasized: Malware represents an unyielding threat, especially to the healthcare and finance industries.

NTT Security, a security consulting and managed … read more

Every year, the SXSW (South by Southwest) conference brings together the best, brightest, and most creative entrepreneurs across a variety of sectors. For many professionals, the event serves as a launching pad for the technology of tomorrow. If you work in the health or healthcare technology sector, you are probably already considering attending SXSW—one of … read more

I sat down with OnRamp’s Head of Information Security, Nikola Todev, to gain his insights on enterprise security planning and strategy.

Businesses leaders are challenged every day with managing their teams, their systems, and their technology. The juggling act has recently become more difficult with the rise of cyberattacks and security breaches—and the stakes … read more

As the conference season ramps up, more than 800 tech professionals will converge on National Harbor, Maryland, for the Xchange Solution Provider Conference, March 5-7. The event will take place at the Gaylord National Resort & Convention Center, offering attendees an all-inclusive conference package with three days of interactive demonstrations, sessions, and networking opportunities. In … read more

Consumer-grade file syncing services (CGFS) are prevalent, providing much needed access to our data. Many of us use some version of this service, such as Dropbox, every day to store and access Word docs, spreadsheets, and presentations, for instance. CGFS services evolve regularly to offer more storage, more security, and better backup and recovery support. … read more

“Could encrypting everything result in a more simplified strategy for security technology, saving costs and improving security posture now and in the future?” – Dave Shackleford, IANS Faculty Member and SANS Analyst

Under HIPAA regulations, organizations that create, receive, maintain or transmit electronic protected health information (ePHI) are required to protect the privacy and security … read more

“A recent U.S. government interagency report indicates that an average of 4,000 ransomware attacks happen daily, since early 2016. This is a 300% increase over the 1,000 daily ransomware attacks reported in 2015.” Source: HHS.gov.

Ransomware presents a very serious threat today. For organizations that work with electronic protected health information (ePHI), ransomware threatens not … read more

It’s that time again: conference planning season. Tech events are taking place all over the world—and while most technology-based conferences are designed to provide you with in-depth exposure to the latest in tech solutions, it can be difficult to decide which events to attend.

Some conferences provide high-level information but limited networking opportunities. Others provide … read more

CloudEndure, a disaster recovery solutions provider, released the results of its 2016 Disaster Recovery Challenges and Best Practices survey, demonstrating the gap between organizations’ goals and their reality. After collecting information from 141 IT professionals about their disaster recovery experiences, the top challenge among respondents was reaching goals with insufficient IT resources—due to budget and … read more