Deepfake videos are everywhere. So how do we know what’s real?

Remember the phrase “Seeing is believing?” Deepfake videos have people second guessing what they are watching. Deepfakes are videos manufactured by AI technology that can superimpose someone’s face on another person’s face and manipulate them into saying or doing things that didn’t happen. These videos have been used to spread propaganda on social media networks …

Deepfake videos are everywhere. So how do we know what’s real? Read More »

Should businesses prepare for the California Consumer Privacy Act?

Any for-profit company that does business or has customers in California should prepare for the California Consumer Privacy Act (CCPA). Here’s why they should. The CCPA applies to businesses that are collecting data and personal information of residents in California, who meet one of the following conditions: Has an annual gross revenue of $25 million …

Should businesses prepare for the California Consumer Privacy Act? Read More »

Lessons from our recent HITRUST Community Extension Program.

On August 27, 2019, ESHA IT, facilitated a successful HITRUST Community Extension Program in New York city. Security and Technology professionals from organizations in healthcare, finance and technology attended the town hall. Michael Parisi, VP of Assurance Strategy & Community Development was the main speaker and he did a great job informing the attendees about …

Lessons from our recent HITRUST Community Extension Program. Read More »

Are we forgetting to “lock the front door” when we invest in Cybersecurity? Lessons from the Capital One and Equifax data breach.

Like my high school coach always said, “Stick to your basics”. The Equifax and CapitalOne breaches reminds us that cyber-attacks don’t always come from sophisticated hacking groups. I’m sure these companies were using the best cybersecurity software that money could buy. They probably had good internal and external IT support.  However, the data breaches they …

Are we forgetting to “lock the front door” when we invest in Cybersecurity? Lessons from the Capital One and Equifax data breach. Read More »

FaceApp screenshot

Should you be concerned about the security of FaceApp?

FaceApp, the AI-powered picture-editing program, is trending in social media. We’ve all seen the pictures of celebrities using FaceApp to make themselves look older or younger. However, security experts are concerned about the possibility that the app could access more than pictures. Many users don’t realize that the app, owned by an overseas company, doesn’t …

Should you be concerned about the security of FaceApp? Read More »

How can your company prevent a data breach through a third-party vendor?

Companies of all sizes are doing a good job beefing up their cybersecurity and that’s great. But… many are forgetting an often overlooked target – their third party service providers. Any company that uses a third-party CRM software or an outside a server with access to sensitive or confidential data, could be risking a data-leak. …

How can your company prevent a data breach through a third-party vendor? Read More »

10 reasons why just buying a security product is not a strategy.

With the number of security breaches occurring right now there is a tremendous focus on cybersecurity in companies of all sizes. In many cases, the board wants to know that this is being focused on.  For a mid-size company with multiple competing priorities, the amount of investment they can make on cybersecurity is limited. The …

10 reasons why just buying a security product is not a strategy. Read More »

Scroll to Top

This website uses cookies to ensure the best user experience. By using this site, you agree to the use of cookies as explained in our privacy policy.