TechR2

About the Federal Information Security Modernization Act (FISMA)

Data security took another stride last week with the passing of the Federal Information Security Modernization Act (FISMA) which made it through the House and Senate without issue. It is currently on its way to the desk of the President. This was the first cyber bill of the lame-duck session.

ROI Savings Using an ISO 27001 Organization

Last month, a seminar was held locally with many of the information security professionals in our area and an expert spoke of the necessity of having the ISO 27001 certification. After the formal presentation, this person was answering several pointed questions. One of those queries was about using vendors who also have the ISO 27001 certification and the specialist stated the cost of using a company that did not also have the security standard was going to be sizable. The organization was going to have to allocate resources to implement the same ISO controls at the vendor’s location that they were using at their site to meet their security plan.

How to Securely Wipe Data from a Mobile Device

How to Securely Wipe Data from a Mobile Device Recently, I was reading the HIPAA COW POLICY/PROCEDURE WORKGROUP, DEVICE, MEDIA, AND PAPER RECORD SANITIZATION FOR DISPOSAL OR REUSE whitepaper from their website and found that they want the cell phones, smart phones, PDAs, tablets and similar devices wiped using a software solution. At TechR2, we […]

TechR2 Stands Out at Celebration of Industry’s Best

July 31, 2014 – COLUMBUS, OH – Business of Security events are held several times a year throughout Central Ohio. Business of Security was founded in 2005 and has run over 120 events in the US. The executive panel format dubbed, “Roll the Dice” was launched in Columbus in 2013 and drew 135 people for both the inaugural event and the one held in July of 2014. Business of Security also conducts “Art of the Craft” networking events at the Actual Brewing Company that draw 85-100 people.

21% Increase in Data Breaches in the First Half of 2014

21% Increase in Data Breaches in the First Half of 2014

395 data breaches have occurred that have been reported in the U.S. so far this year [By July 2014], a 21 percent increase over the same period last year.
In some of the cases, laptops or thumb drives containing information were stolen. And in many of the cases, the breaches were attributed to poor data security practices or simple errors that could have been avoided.

Tear-A-Byte®, The patented exclusive onsite data eradication solution by TechR2

Tear-A-Byte®, The patented exclusive onsite data eradication solution by TechR2 Do you know where your hard drives go at night? The #1 cause of large-scale data breaches is the loss of data-bearing media. Data breaches have become a major concern in every business and industry, from healthcare to education, banking to retail, costing a company […]

Compliance: Privacy Regulations Based on Industry

Compliance: Privacy Regulations Based on Industry [vc_row][vc_column width=”1/3″][vc_column_text]Protecting your brand and reputation is crucial to every organization as the number of data breaches is constantly on the rise. There are guidelines already in place for most organizations. Learn more about your industry’s regulations for data security. Do you accept payment via credit card? PCI, The […]

Outsource your IT without risking your data and device security

Outsource your IT without risking your data and device security [vc_row][vc_column width=”1/3″][vc_column_text]A 2013 Gartner report predicted the global IT outsourcing market to reach $288 billion, with Asia-Pacific, Latin America, and Great China markets expanding more than 13 percent. In a recent article, Bryan Britz, Research Vice President at Gartner, said, “Enterprise buyers pursuing hybrid IT […]

Lessons Learned at Business of Security Event

Lessons Learned at Business of Security Event Last week members of the TechR2 team had the opportunity to interact with a group of seasoned Information Security leaders at a Business of Security networking event. We had a great time learning from special guests: Cindi Hart, Kim L. Jones, Kent King, Larry Mead, Mike Scott, and […]

Is it IT’s job to convince their execs to prioritize data security?

Is it IT’s job to convince their execs to prioritize data security? [vc_row][vc_column width=”1/4″][vc_column_text]A recent blog post in Tech Republic cites an enlightening Ponemon Institute report about the effectiveness of security metrics. As it turns out, great security metrics typically don’t drive companies to enhance security. Why? It’s no surprise that IT people either feel […]