TechR2

Compliance: Privacy Regulations Based on Industry

Compliance: Privacy Regulations Based on Industry [vc_row][vc_column width=”1/3″][vc_column_text]Protecting your brand and reputation is crucial to every organization as the number of data breaches is constantly on the rise. There are guidelines already in place for most organizations. Learn more about your industry’s regulations for data security. Do you accept payment via credit card? PCI, The […]

The High Cost of "Free" Data Destruction

The High Cost of “Free” Data Destruction IT asset disposal made headlines around the world last week when the UK Information Commissioner’s Office (ICO) fined NHS Surrey £200,000 (about $300,000) over loss of secret data of more than 3,000 patients. According to the data watchdog, thousands of patient records were discovered on a second-hand NHS […]

Outsource your IT without risking your data and device security

Outsource your IT without risking your data and device security [vc_row][vc_column width=”1/3″][vc_column_text]A 2013 Gartner report predicted the global IT outsourcing market to reach $288 billion, with Asia-Pacific, Latin America, and Great China markets expanding more than 13 percent. In a recent article, Bryan Britz, Research Vice President at Gartner, said, “Enterprise buyers pursuing hybrid IT […]

Is your CEO criminally liable if discarded data devices aren’t clean?

Is your CEO criminally liable if discarded data devices aren’t clean? IT professionals are often frustrated by CEOs and corporate executives who don’t prioritize data security. This is frequently a case of priorities and personalities rather than rational decision making. Last week we wrote about corporate executives imprisoned for improper disposal of technology waste. This […]

Retiring point of sale terminals? Protect your data.

Retiring point of sale terminals? Protect your data. We’ve all been to the grocery store, tried to sign the screen for our credit card purchase, and watched as our careful signature is rendered as an illegible scrawl. In-store credit card terminals and point of sale (POS) terminals don’t last forever. But what happens when they […]

Back to School: Is your student data safe?

Back to School: Is your student data safe? Families everywhere are preparing their students to go back to school, and the schools themselves are preparing themselves for the student invasion. But are schools prepared for the student data security challenges? Anyone who has a student knows that sensitive data, such as social security numbers and […]

Patient data safety: Don’t leave it to the laundry department!

Patient data safety: Don’t leave it to the laundry department! Twice this spring, sensitive medical data from major New York hospitals were copied onto flash drives, exposing patient medical data to anyone who might find the drives. These were not spent server hard drives or sophisticated backup drives. These were simple flash drives — the […]

Intense Expectations for Healthcare Security Predicted in 2014

  In 2013, 45% of data breaches were in the healthcare industry. Because of this, compliance and regulations in healthcare are expected to intensify throughout this calender year. This will not bode well for what healthcare privacy, information security, and compliance officers were wishing for this year. In a recent survey performed by ID experts […]