Malware

Data breach News

View All News

Data breach Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Data breach Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Data breach

Learn to apply best practices and optimize your operations.

  • Best Practices for Secure Texting in Healthcare

    As healthcare providers and vendors seek information about how to safeguard personal health information (PHI), texting is one area that without question carries a great deal of risk. It's convenient, but unsecured texting of PHI opens healthcare organizations up to additional scrutiny, at best; at worst, lawsuits and fines.

    In this handbook, experts explain how secure texting policies can enable convenience in healthcare organizations but still comply with HIPAA regulations. First, contributor David Weldon examines the role that corporate culture plays in stressing the importance of secure communications throughout the organization. Next, news and features writer Shaun Sutner offers tips from a lawyer on how to combat the dangers of unsecured texting of PHI in healthcare. Finally, contributor Reda Chouffani looks at data breaches in healthcare statistics from 2015 and provides insights into how you can protect your organization against breaches.

     Continue Reading

  • Deconstructing the emergency incident response process

    Professional incident response providers can quickly bring the additional resources and the expertise that companies often need to handle a rapidly unfolding threat. Continue Reading

  • Ask the expert: HIPAA breaches and the tech most likely to cause them

    It's safe to say HIPAA breaches should be avoided at all costs. One CISO discusses the technology most likely to cause a breach and what to do to ensure compliance. Continue Reading

View All Manage

Problem Solve Data breach Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Forming a DR/BC plan for the inevitable data breach

    According to one statistic, as of July 2015 there were, in total, almost 4 million applications available on the app stores of Amazon, Apple, BlackBerry, Google and Windows. This figure is only one reflection of how the technologies that enable our digital selves -- like mobile computing, cloud and social media -- have not only transformed the way we work, but also how we live. In light of the fact that we also now live in an increasingly cyberthreat-filled landscape, having a comprehensive DR/BC plan is no longer optional for enterprises, says SearchCIO columnist and former CIO Harvey Koeppel.

    In this SearchCIO handbook, Koeppel offers a list of DR principles CIOs can follow to help them design and implement a solid DR/BC plan that will protect both business and personal data when the next disaster strikes. In our second piece, CTO Niel Nickolaisen shares advice on how to get the most value out of DR testing -- without risking damage to your organization. In our last article, writer Mary K. Pratt gathers tips from DR experts on how to craft a DR/BC plan that can tackle any type of disaster, including data breaches. Continue Reading

  • How to handle a data breach: Managing public perception

    When your organization plans out how to handle a data breach, managing public perception should be given special consideration. One piece of advice: Don't play the victim. Continue Reading

  • Eight-step data breach plan for the IT organization

    A data breach plan that addresses the many variations a hack can take should consider these eight points. Continue Reading

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close