The role of the modern CTO with regards to Cybersecurity

How the times have changed. 15 years ago, cyber-security consisted of making sure you had an anti-virus program running on your machines. It didn’t matter if it was effective, but the presence was enough to assuage our cybersecurity requirement. Though phishing, ransomware, data breaches, and compliance existed, we never treated it as a primary concern. …

The role of the modern CTO with regards to Cybersecurity Read More »

Insider Threats—Healthcare’s Crippling Reality

We often learn about the latest security issues, threats, vulnerabilities, attacks, and ransoms every day. While much of the advertised information we read is about external vulnerabilities, there is another, often-overlooked, hazard lying in wait: Insider threats. What are Insider Threats? An insider threat is an often-overlooked security threat from within an organization. Often an …

Insider Threats—Healthcare’s Crippling Reality Read More »

HITRUST just released Version 9.3 of the HITRUST CSF. How will that affect your company?

On October 28, 2019, HITRUST announced the release of version 9.3 of the HITRUST CSF information risk and compliance management framework. The HITRUST CSF is an important step in the HITRUST certification process. It provides necessary risk management and compliance methods that helps organizations ensure that their security programs are aligned and meets compliance standards. …

HITRUST just released Version 9.3 of the HITRUST CSF. How will that affect your company? Read More »

Five Important Concerns of Cybersecurity Today

October is National Cybersecurity Awareness Month​ and it’s a reminder that we need to be vigilant about protecting our privacy and our business from possible cyber attacks.  This initiative is a joint effort between the US government and the technology industry to spread cybersecurity awareness. This year’s theme is “Own it, secure it, protect it” …

Five Important Concerns of Cybersecurity Today Read More »

Deepfake videos are everywhere. So how do we know what’s real?

Remember the phrase “Seeing is believing?” Deepfake videos have people second guessing what they are watching. Deepfakes are videos manufactured by AI technology that can superimpose someone’s face on another person’s face and manipulate them into saying or doing things that didn’t happen. These videos have been used to spread propaganda on social media networks …

Deepfake videos are everywhere. So how do we know what’s real? Read More »

Who should prepare for the California Consumer Privacy Act?

Any for-profit company that does business or has customers in California should prepare for the California Consumer Privacy Act (CCPA). Here’s why they should. The CCPA applies to businesses that are collecting data and personal information of residents in California, who meet one of the following conditions: Has an annual gross revenue of $25 million …

Who should prepare for the California Consumer Privacy Act? Read More »

Lessons from our recent HITRUST Community Extension Program.

On August 27, 2019, ESHA IT, facilitated a successful HITRUST Community Extension Program in New York city. Security and Technology professionals from organizations in healthcare, finance and technology attended the town hall. Michael Parisi, VP of Assurance Strategy & Community Development was the main speaker and he did a great job informing the attendees about …

Lessons from our recent HITRUST Community Extension Program. Read More »

Are we forgetting to “lock the front door” when we invest in Cybersecurity? Lessons from the Capital One and Equifax data breach.

Like my high school coach always said, “Stick to your basics”. The Equifax and CapitalOne breaches reminds us that cyber-attacks don’t always come from sophisticated hacking groups. I’m sure these companies were using the best cybersecurity software that money could buy. They probably had good internal and external IT support.  However, the data breaches they …

Are we forgetting to “lock the front door” when we invest in Cybersecurity? Lessons from the Capital One and Equifax data breach. Read More »

FaceApp screenshot

Should you be concerned about the security of FaceApp?

FaceApp, the AI-powered picture-editing program, is trending in social media. We’ve all seen the pictures of celebrities using FaceApp to make themselves look older or younger. However, security experts are concerned about the possibility that the app could access more than pictures. Many users don’t realize that the app, owned by an overseas company, doesn’t …

Should you be concerned about the security of FaceApp? Read More »

Scroll to Top

CONTACT US TO MAKE YOUR NEXT MOVE

This website uses cookies to ensure the best user experience. By using this site, you agree to the use of cookies as explained in our privacy policy.