Data Storage in Data Life Cycle

Why Storage is Overlooked in the Data Life Cycle

Every piece of data that is in development, living on our devices, or in cold storage is in a different stage of its life cycle. This digital information needs to have a level of protection at every stage to ensure … Continue Reading

Tips for Working Remotely with Proper Tools

In the Face of COVID-19: Working Remotely, Efficiently

As more parts of the United States are placing greater restrictions on outside activity due to COVID-19, and with many businesses and schools closing, it’s easy to feel stressed about work and earning money. Already, a large number of workers … Continue Reading

Law Enforcement Geo-Fencing Data Privacy

Law Enforcement Geofencing Warrants Cause Privacy Concerns

Location data on mobile devices does more than just make navigation easier, now these features allow law enforcement to identify criminal suspects. The term “geofencing” refers to a boundary around a certain location that is set using location-based software or … Continue Reading

Healthcare Organizations Fight for Mobile Security

Healthcare Organizations Fighting Plague of Compromised Mobile Devices

Hospitals house the personal information of countless patients. From people coming in for checkups, to every child born within their walls, the ever-growing storage of patient information is both a wealth of information for doctors and researchers… and a treasure … Continue Reading

Clearview AI Data Breach Client List

Law-Enforcement Partner that Stores Billions of Consumer Photos Loses Client List in Data Breach

When you think about a company that partners with law enforcement, you assume that security would be their top priority. In this case, Clearview AI, a startup company that stores photos to be used with facial recognition technology, has come … Continue Reading

CIA and German Encryption Scheme

CIA Participates in Nationwide Encryption Scheme

Government entities worldwide have used encryption to enable confidential communication about covert operations, allied countries, and strategic plans during wartime. Beginning in the 1940s during World War II and continuing throughout the Cold War, a machine known as the M-209 … Continue Reading

Ransomware Healthcare Financial Patient Loss

Losses in the Healthcare Sector Due to Ransomware

Ransomware attacks have only gained momentum since they became a digital threat. Healthcare organizations are the most targeted groups for ransomware attacks due to the sensitive protected health information (PHI) that they store. These attacks result in financial losses and … Continue Reading

Privacy Concerns over Biometric ID Programs Across the World

Privacy Concerns with Government-Imposed Biometric ID Programs

In our lifetime, technological advancements have aided in creating vast networking capabilities, making services easier to utilize and giving billions of people opportunities they might not have had otherwise. But with technology, whether existing or emerging, the more it is … Continue Reading

Best Practices to Protect PHI from Hackers

How Healthcare Organizations Protect PHI from Hackers

To a healthcare organization, its most valuable assets are the technology used to treat disease and highly trained medical professionals who care for patients. To a hacker, the most valuable asset is protected health information (PHI). This dataset contains information … Continue Reading

Healthcare Systems and Your Patient Data

How Your Digital Patient Information is Shared in Healthcare Systems

In the healthcare world, providing excellent patient care will always be the chief priority along with the oath to ‘do no harm.’ Healthcare organizations throughout the United States abide by this oath, but when it comes to a patient’s protected … Continue Reading