Security

Latest Posts in

Proactive Security Strategy for the Public Sector (10 Steps, Part One)

The U.K. public sector holds some of the most important and sensitive data in the country, from private medical records to military intelligence. Consistently protecting this data is a major…

Beyond the EHR: 3 Other Places Healthcare Organizations Need to Watch to Ensure HIPAA Compliance

With the state of the world today, healthcare facilities of all kinds and sizes are operating under a state of distress. Employees are working on the frontlines, while also having…

Protecting Patient Data Through Strict Access Rights Management

The healthcare ecosystem is complex, and the diversity of the different departments and devices results in a multifaceted IT infrastructure that can be hard to manage. With increasing digitalization, healthcare…

Hey, [Insert Family/Friend Name Here], Let’s Talk About Online Security

2020 keeps on proving the old adage, “It gets worse before it gets better.” We still seem to be in the “worse” stage. If you’ve been paying attention to the…

3 Foundational Elements of Zero Trust You Can’t Do Without

While the concept of zero-trust security has many IT organizations thinking in terms of identity, access, and cloud services, zero trust must run on a solid foundation. We should start…

2020.2 Releases: Orion Map Updates, New Security Product Features, and More – SolarWinds Lab #89

 SolarWinds 2020.2 product releases contain upgrades, improvements, and new features across the entire stack. Solutions for IT operations management, software-defined infrastructure, and hybrid IT monitoring all have been updated.…

Data Security and Privacy Techniques for Everyone

Everyone on the internet should follow good data security and privacy practices. And when I say everyone, I mean everyone. IT pros aren’t the only people who need to protect…

Four Strategies for Securing the Tactical Edge

The military has invested significant time and money implementing edge computing on the battlefield. The Army’s efforts to leverage the tactical cloud to process data on the edge gets information…

Ideas for Combatting DoD Mobile Security Threats

In government, mobile devices are both embraced and resisted. The mobility and ease of use afforded by smartphones and tablets helps boost worker productivity even as they open doors for…

Improving Cybersecurity Starts at the Endpoints

Careful monitoring and attention to endpoints are just two elements of a strong cybersecurity strategy for K-12 districts. Cybersecurity must be a top priority for K-12 schools. Schools need to…