Every year, the scope and impact of cyber threats expand. E-commerce businesses must adhere to PCI DSS rules, but many choose to take further data security measures to build consumer confidence and minimize the effects of data breaches. Boutique sites and large retailers alike need current and compliant security measures to protect e-commerce sales in … read more

Preparation not only prevents breaches, but also minimizes the impact of a breach on your business operations. Here’s what to do if you’re in the midst of a breach.   

Experts say it’s no longer a question of if you will be hacked, but of when you will be hacked—and how quickly you can recover … read more

When it comes to colocation, shoppers have historically sought after inexpensive space and power. Today, that is not enough. Well-informed businesses should seek the most agile data center solutions with security measures that safeguard their infrastructure from cyber threats. As you review, update, and optimize your data center arrangements, consider what’s different about colocation services … read more

Trends in the digital threat landscape support the urgent need for strong data security foundations. With the publication of the “NTT Security SERT (Security Engineering Research Team) Q3 ‘16 Intelligence Report,” a few truths are emphasized: Malware represents an unyielding threat, especially to the healthcare and finance industries.

NTT Security, a security consulting and managed … read more

Every year, the SXSW (South by Southwest) conference brings together the best, brightest, and most creative entrepreneurs across a variety of sectors. For many professionals, the event serves as a launching pad for the technology of tomorrow. If you work in the health or healthcare technology sector, you are probably already considering attending SXSW—one of … read more

I sat down with OnRamp’s Head of Information Security, Nikola Todev, to gain his insights on enterprise security planning and strategy.

Businesses leaders are challenged every day with managing their teams, their systems, and their technology. The juggling act has recently become more difficult with the rise of cyberattacks and security breaches—and the stakes … read more

As the conference season ramps up, more than 800 tech professionals will converge on National Harbor, Maryland, for the Xchange Solution Provider Conference, March 5-7. The event will take place at the Gaylord National Resort & Convention Center, offering attendees an all-inclusive conference package with three days of interactive demonstrations, sessions, and networking opportunities. In … read more

Consumer-grade file syncing services (CGFS) are prevalent, providing much needed access to our data. Many of us use some version of this service, such as Dropbox, every day to store and access Word docs, spreadsheets, and presentations, for instance. CGFS services evolve regularly to offer more storage, more security, and better backup and recovery support. … read more

“Could encrypting everything result in a more simplified strategy for security technology, saving costs and improving security posture now and in the future?” – Dave Shackleford, IANS Faculty Member and SANS Analyst

Under HIPAA regulations, organizations that create, receive, maintain or transmit electronic protected health information (ePHI) are required to protect the privacy and security … read more

“A recent U.S. government interagency report indicates that an average of 4,000 ransomware attacks happen daily, since early 2016. This is a 300% increase over the 1,000 daily ransomware attacks reported in 2015.” Source: HHS.gov.

Ransomware presents a very serious threat today. For organizations that work with electronic protected health information (ePHI), ransomware threatens not … read more

It’s that time again: conference planning season. Tech events are taking place all over the world—and while most technology-based conferences are designed to provide you with in-depth exposure to the latest in tech solutions, it can be difficult to decide which events to attend.

Some conferences provide high-level information but limited networking opportunities. Others provide … read more

CloudEndure, a disaster recovery solutions provider, released the results of its 2016 Disaster Recovery Challenges and Best Practices survey, demonstrating the gap between organizations’ goals and their reality. After collecting information from 141 IT professionals about their disaster recovery experiences, the top challenge among respondents was reaching goals with insufficient IT resources—due to budget and … read more

As of November 1, 2016, the PCI SSC (Payment Card Industry Security Standards Council) considers PCI DSS 3.1 officially retired. According to the PCI SSC, all retail businesses should implement the new regulations published in the Payment Card Industry Data Security Standards (PCI DSS) version 3.2. Businesses must take steps to comply with the new … read more

The RSA Conference in San Francisco, scheduled for February 12–17, is one of the world’s best cybersecurity gatherings. Every year, tens of thousands of attendees flock to the West Coast to hear the latest in industry innovations and solutions to cybersecurity issues. OnRamp will attend the five-day event at the Moscone Center and Marriott Marquis, … read more

This is the second in a two-part series on issues related to the IoT, BYOD and cybercriminal attacks on ePHI. We suggest started with part I if you have not read it.

The internet of things (IoT) includes personal mobile devices and wearables that employees and contractors use daily, inside and outside of the workplace. … read more

This year’s Healthcare Information and Management Systems Society (HIMSS) annual conference kicks off on February 19, 2017. The five-day conference, held at the Orange County Convention Center in Orlando, FL, focuses on education and networking for professionals in healthcare management, healthcare finance, and healthcare technology. It’s considered one of the top 10 health IT conferences … read more

Establishing clear business associate agreements are important for not only remaining HIPAA compliant, but for adequately safeguarding patient PHI. Sara Heath, HealthIT Security

In 2016, the Office for Civil Rights (OCR) put a spotlight on Health Insurance Portability and Accountability Act (HIPAA)-affected business associates (BAs). “A ‘business associate’ is a person or entity that performs … read more

Agility is at the core of next-level competitiveness in the modern globalized marketplace. Hybrid cloud environments give businesses the best of both worlds—the privacy/security of private cloud and the flexibility of the public cloud. An organization that knows how to use hybrid cloud technology to its advantage will enjoy long-term sustainability.

Beyond the Basic Benefits … read more

Organizations that work with electronic protected health information (ePHI) must carefully weigh the risks and benefits of adopting new technology. From the internet of things (IoT) in hospitals to wearable medical devices to bring your own device (BYOD) policies, each endpoint represents a potential network vulnerability. Avoiding the adoption of new technology is not the … read more

The completion of the SOC 3 audit demonstrates that OnRamp’s enterprise-class data center services meet the rigorous requirements associated with data protection and compliance.

AUSTIN, TEXAS.— OnRamp Access, LLC, a leading high security and compliant hosting provider, announced today the completion of a SOC 3 audit confirming that OnRamp’s solutions fulfill the necessary controls … read more