In 2000, Canada enacted its data protection act designed to protect consumers’ identifiable information. Since it was passed into law, the Personal Information Protection and Electronic Documents Act (PIPEDA) has…
-
-
Does your company do business in Canada? If so, and it includes transmitting, storing, and using personally protected information (PII), the organization must meet the Personal Information Protection and Electronic…
-
Third-party vendor management policy is perhaps the most underrated component to a mature cybersecurity strategy. Last year, Becker’s Hospital IT reported startling statistics:
-
No matter how robust a company’s information technology (IT) resources and protections are, they’re always subject to risk. Even the most proactive companies struggle to keep pace with the evolution…
-
For companies looking to shore up their cybersecurity, vulnerability management tools and practices are some of the most important areas to look into. Some of the more architectural pieces of…
-
The US healthcare industry is one of the most attractive targets for cybercrime worldwide. Any attack, like the recent ransomware strike on Universal Health Services, can freeze hundreds of providers…
-
Performing a cybersecurity audit of your third-party vendors and partners is critical to ensure they’re taking proper measures to protect your data when it’s in their hands.
-
Social engineering assessment is a crucial step to achieve protection from data breaches. Cybersecurity hacks are becoming more prevalent with increasing complexity. These have become severe threats that cause irreparable…
-
Addressing intrusion in cybersecurity is becoming a more complex issue every day. Firewalls can only do so much, and it’s up to event threat detection and response teams to ensure…
-
If the COVID-19 pandemic has proven anything beyond the shadow of a doubt, it’s the vital necessity of accessible healthcare throughout the country. The spread of the virus, as well…