The ROI of Information Security

Posted by & filed under List Posts.

ROSI - the return on security investment. Fingerprint on keyboard - assessment of solutions

People often talk about security in terms of defenses and caution – an emergency system to prevent worse-case scenarios. However, thinking in terms of defense and prevention can distract us from a fundamental truth: security is powerful. It has an incredible amount of value to organizations across all sectors and markets. Establishing the ROI of… Read more »

7 Steps to a HIPAA-Compliant Risk Analysis

Posted by & filed under List Posts.

HIPAA risk analysis - steps to achieve - doctor on laptop

As you consider your risk analysis and efforts to keep it HIPAA-compliant, it is helpful to understand that the notion of risk is inherently context-based. Whenever you think about risk, initial questions to ask yourself are: What asset am I attempting to protect? What are potential threats? What must be defended? How substantial is the… Read more »

How the IT Threat Landscape Will Change in 2018

Posted by & filed under List Posts.

How the IT Threat Landscape Will Change in 2018

In late 2016, Forrester forecast that automation and security services would be used increasingly to meet a shortage of tech talent, that greater than half a million IoT devices would be hacked, that compromises of healthcare systems would become as extensive and prevalent as previous ones within retail, and that a significant IT security breach… Read more »