tech blog header

Free Whitepaper

Follow Us

Your email:

Blog Topics

Cloud Computing, Exchange 2013

Current Articles | RSS Feed RSS Feed

4 Types of Managed Services for Better IT Security

 
IT Support Services

IT outsourcing encompasses a great many different functions that can help businesses to lower their costs and become leaner operations.  One of the most useful of these functions is managed security services, sometimes simply referred to as managed security.  There are several different ways managed security can help to create a more robust computing environment. 

IT Support More Important Than Ever After HIPAA Ruling

 
HIPAA Logo

Any business or other organization, including non-profits, that deal in any way with patient medical information, needs to make sure that all systems and programs enable its workers to fully comply with the mandates embedded in HIPAA, the nation’s primary law regarding security and confidentiality of medical records.  This fact was highlighted by a recent decision of an appellate court, which ruled that those who violate the provisions of HIPAA might face criminal penalties including jail time, even if the individuals involved had no idea that they were contravening the law. 

IT News: House Bill Recommends Continuous Monitoring

 
Continuous Monitoring of IT Security

A piece of federal legislation known as the Federal Information Management Security Act (FISMA), is making its way through the constitutional requirements for full adoption.  Most recently, it passed the House of Representatives via Voice Vote.  The FISMA bill would provide updates to the law, which was first enacted a decade ago in 2002. 

Cyber Security: Obama Supports NIST Trusted Identities Project

 
Trusted Identities Project and Secure Web Transactions

Legislative gridlock and wrangling is nothing new, but one of the projects currently caught in a tug-of-war between Congress and the Executive Branch is an initiative known as the National Strategy for Trusted Identities in Cyberspace (NSTIC).  Funding in excess of $24 million, originally intended to help the National Institute of Standards and Technology (NIST) create an online system of trusted credentials to aid in the authentication of online identies during web transacations, is now in doubt. 

NIST Revises Security Response Guidelines and Praises IT Services

 
laptop2

NIST, the National Institute of Standards and Technology, is currently revising its guidelines for how computer security incidents are handled in both the business and government sectors.  The original guide was published in March of 2008 and was classed as Special Publication 800-61.  At the time of its publication, the threat environment was very different from the one businesses must confront today.  Then, attacks tended to be short and much easier to detect.

6 Key Elements of the Consumer Privacy Bill of Rights

 
Laptop Mobile Connection

Businesses that use information technology to deal with customers in any way should become aware of the major provisions in the Consumer Privacy Bill of Rights, issued by the White House on 23 February.  The goal of the document is to provide better protection for consumers as well as offer businesses clear guidance in this area.

IT Solutions: Breach Prevention

 
IT Consulting

The federal government's HIPAA notification requirements insist that certain kinds of security breaches be reported. To date, almost 400 such breaches have been documented under the requirements, and nearly 20 million Americans have learned that their personal data may have been compromised. Obviously, this is beneficial neither to the individuals nor to the businesses involved. However, what can be done to prevent such breaches in the future.

Keeping Compliance Data Accessible is Essential

 

The rise of SaaS, or software as a service, has meant that businesses no longer have to store rarely used data on site.  Instead, they can offshore it to the cloud, thereby freeing up valuable infrastructure resources on the premises for data that is accessed far more frequently.  Security experts, however, recommend that companies carefully analyze businesses offering managed services before they offshore certain kinds of data to the cloud. 

GAO Urges Government to Guide Network Security in Private Sector

 
Network security

In most organizations, keeping business computer systems and infrastructure secure from intrusions and hacking is one of the most critical functions performed by IT staff.  Now, new information emerging from the Government Accountability Office is indicating that the Department of Homeland Security could do far more to help with this task. 

Congress Drafting Cybersecurity Legislation

 
Network security

The House Subcommittee devoted to cybersecurity and infrastructure protection is holding hearings this week regarding the founding of a National Information Sharing Organization to be run as a not-for-profit agency that will help to distribute information about online threats.  Such information would be shared not only with the various levels of government but also with business entities across the nation. 

All Posts