WordPress Security Best Practices for 2018

Posted by & filed under List Posts.

Lock against code - WordPress security steps to take in 2018

Statistics garnered from analysis of tens of thousands of WordPress sites within the Alexa top 1 million suggest why hackers often choose WordPress to attack. Incredibly, the study from WP WhiteSecurity found that 70% of installations are vulnerable to hacking. The researchers looked at the WordPress installation status and behavior of these WordPress sites in… Read more »

Why Security is a Top Priority for Ecommerce

Posted by & filed under List Posts.

With growth of malware and ransomware, security is a top priority.

It is easy to develop blind spots in our thinking, particularly toward things that we see often, as if they become invisible to us after so much repetition. For instance, we may read so much about cyberattacks and how important security is that it may make it more difficult to logically consider the topic and… Read more »

7 Steps to a HIPAA-Compliant Risk Analysis

Posted by & filed under List Posts.

HIPAA risk analysis - steps to achieve - doctor on laptop

As you consider your risk analysis and efforts to keep it HIPAA-compliant, it is helpful to understand that the notion of risk is inherently context-based. Whenever you think about risk, initial questions to ask yourself are: What asset am I attempting to protect? What are potential threats? What must be defended? How substantial is the… Read more »

What the GDPR Means for Global Business

Posted by & filed under List Posts.

data eminating outward from the individual, the key concern of the General Data Protection Regulation from the European Union

Bolstered consumer consent. The “right to be forgotten.” 72-hour breach reporting. Hefty fine schedules. These aspects of the General Data Protection Regulation from the European Union are now in effect, as of May 25, 2018. As the most significant change to data security law in Europe in two decades, this new set of rules is… Read more »

GDPR Has Launched – 7 Steps to Compliance

Posted by & filed under List Posts.

Juggling security to protect sensitive customer data - GDPR compliance steps - General Data Protection Regulation

While there are borders between nations, the world is integrally connected. That is perhaps nowhere more evident than in the marketplace of the Internet. The interconnection that the Web allows also means that security is a huge priority, since no one wants anyone who is unauthorized accessing their confidential data. Sometimes legislation will be passed… Read more »

How to Secure a Data Center

Posted by & filed under List Posts.

image of data center diversity and isolation for security

The nonprofit Identity Theft Resource Center keeps an ongoing record of incidents involving data compromise. The information is gathered from government agency releases and articles in the press. This effort started on January 1, 2005. Between that point and February 7, 2018, the organization has logged more than 8600 breaches, with a staggering 1.07 billion… Read more »

How to Secure Your Cloud Server

Posted by & filed under List Posts.

How to Secure Your Cloud Server

A few years ago, security was listed as one of the biggest reasons people might not want to entrust their data to the cloud. For good reason, companies have been careful and systematic in figuring out what information systems to use; security challenges on the Internet are by no means a new thing. Even back… Read more »

How to Secure E-Commerce

Posted by & filed under List Posts.

How to Secure E-Commerce

Digital attacks are, of course, of many different approaches and scopes; and the value of data that is stolen also is across a broad spectrum. While that case-by-case diversity exists, there is a commonality of being at risk across all businesses. Incredibly, a report last year revealed that half of small businesses in the United… Read more »

How to Secure WordPress

Posted by & filed under List Posts.

How to Secure WordPress

In February 2017, security researchers confirmed that as many as 20 hackers were injecting code into WordPress sites that had not yet updated to the newly released version of the platform, 4.7.2. The flaw within the REST API, fixed by the January 26 update, was making it possible for unauthorized users to change content of… Read more »

What is GDPR Compliance?

Posted by & filed under List Posts.

What is GDPR Compliance

Is your organization ready for the May 25, 2018, effective date of the General Data Protection Regulation (GDPR)? This short guide gives you a sense of what guidelines it contains, along with whose data it safeguards and who will have to follow the rules.   Understanding the GDPR   5, 4, 3, 2, 1… Second… Read more »