2019 Password Policy Best Practices

Posted by Rose Doherty on Jun 5, 2019 8:15:00 AM


Why are Microsoft, the NIST and the Department of Homeland Security Recommending New Password Policies for 2019?


Complex passwords policies have proven to do more harm than good, resulting in users creating easy to remember passwords that are even easier to hack! The Verizon 2019 Data Breach Investigations Report confirms that hackers are taking full advantage, revealing that hacking is the #1 cause of data breach in 2019.  The report identifies phishing and the use of stolen credentials (passwords) as the top 2 hacking techniques used is successful data breaches.  

Microsoft, The National Institute of Security Technology (NIST) and the US Department of Homeland Security have drastically changed their recommendations for strong password policies. Let's look at their new recommendations, and how to implement these changes in your organization.

Read More

Topics: Data Security, IT Security, 2019 Password Policy Recommendations, cybersecurity best practices, Password Policy Best Practices, password security, network security, cloud security best practices, cybersecurity strategy, password policy recommendations

15 Lessons Learned from a HIPAA Data Breach

Posted by Rose Doherty on Jul 25, 2018 1:14:14 PM

HIPAA-IT-Security-and compliance

Implementing a strong HIPAA Compliance framework is a requirement for all Covered Entities and Business Associates, but many practices don't realize this is also their best strategy to prevent a breach from happening!   My hope is that understanding what the OCR will ask you for after a Data Breach will help you implement an IT security framework that will reduce your chances of ever experiencing a data breach.  

Read More

Topics: HIPAA Compliance, Data Security, IT Security, cybersecurity, ePHI Security, HIPAA Risk Analysis

8 Tips from the OCR to Prevent a Phishing Attack

Posted by Rose Doherty on Mar 14, 2018 1:23:17 PM

February 2018 OCR Cybersecurity Newsletter - Phishing

Phishing remains one of the most successful tactics used by hackers to steal sensitive information such as usernames, passwords, and credit card details. In phishing attacks, cyber-criminals disguise emails to make the recipient think it is from someone they trust, and  The Department of Homeland Security warns that 97% of people can not identify a phishing attempt. Read the following IT security tips from the OCR to learn the best cybersecurity strategies to prevent a phishing attack.  

Read More

Topics: IT Security, cybersecurity strategies, prevent a phishing attack, cybersecurity, cybersecurity tips

7 Questions That Will Protect Your Network from Viruses and Ransomware

Posted by Rose Doherty on Apr 22, 2016 1:57:31 PM

Train your employees to ask these 7 questions before clicking an email link. 

The fastest and easiest way for cybercriminals to steal your confidential data or paralyze your network with ransomware is to send an email to your employees and get just one of them to click on a link or open an attachment.  That is all they have to do, and once anyone on the network clicks, they criminal has been invited in to do whatever damage they want.  Employee education is the key to your corporate security.  Teaching them to ask these questions before clicking is one of the most effective security strategies you could implement.

Read More

Topics: Data Security, IT Security

IT Security Best Practice for Mobile Device Use

Posted by Rose Doherty on Dec 21, 2015 8:00:00 AM

4 Smart Tips For Mobile Device Use


If you’re planning on heading out of town – or simply to the coffee shop to work – you will want to keep these tips in mind to keep your data secure.

Read More

Topics: Data Security, IT Security

Cyber-Security Requires Training Employees

Posted by Rose Doherty on Dec 14, 2015 8:00:00 AM

Train your employees  is key to an effective Business Cyber-Security Plan.

Hackers are getting more sophisticated every day, and the ways they lure you to give them access to your computer are downright devious.  It is important that all employees are aware of these simple rules that will help prevent intruders from accessing your computer network.  

Read More

Topics: Security, HIPAA Compliance, Internet Security, IT Security

Cybercriminals Top 3 Tricks to Hack Your Computer Network

Posted by Rose Doherty on Nov 4, 2015 1:04:53 PM


3 Tricks Cybercriminals Use to Attack Your Computer Network

Cybercriminals are extremely sophisticated, but there are 3 tricks they use with tremendous success that you need to be aware of.  Knowing their sneaky schemes will help prevent your business from becoming a victim.

Read More

Topics: Security, Data Security, IT Security

Data Security Best Practices to Avoid the latest Scam.  

Posted by Rose Doherty on Sep 23, 2015 1:22:40 PM

 How to Avoid the newest Tech Support Scam

Cyber criminals have been preying on consumer fears for many years, peddling fake security software, offering free "security" scans, and sending alarming pop up messages telling you that your computer is infected.  Then they try to sell you, or have you download their "security" software, which turns out to be malware that gives the criminal access to your computer and personal information.

The latest version of the scam begins with a scammer calling  you on the phone.

Read More

Topics: Security, Data Security, IT Security

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all