TechR2

Back to School: Is your student data safe?

Back to School: Is your student data safe? Families everywhere are preparing their students to go back to school, and the schools themselves are preparing themselves for the student invasion. But are schools prepared for the student data security challenges? Anyone who has a student knows that sensitive data, such as social security numbers and […]

Data Security Step 1: Don’t let sensitive data walk off

Data Security Step 1: Don’t let sensitive data walk off Do you think most exposure of sensitive data is because of hacking into computer networks? Thousands of patient records and consumer accounts are exposed to the world every month because employees download the information onto portable disk drives, laptops or mobile devices and then lose […]

New HIPAA rules this month: Is your plan in place?

New HIPAA rules this month: Is your plan in place? The HIPAA Omnibus Final Rule is going into effect on Sept. 23, 2013, making enforcement of HIPAA violations and patient data breaches more intense. Violations can be more vigorously enforced and the punishments and fines promise to be more harsh and frequent. The main focus […]

When they audit your data security, what will they find?

When they audit your data security, what will they find? Data breach at Minnesota’s new health insurance exchange. An auditor can come snooping around your company at any time. Depending on the circumstances, he/she may be in a bad mood. You need to be prepared. An employee at MNsure, Minnesota’s new health insurance exchange, emailed […]

Data destruction company is responsible for data breach.

Data destruction company is responsible for data breach. Not all data destruction services are created equal. NHS Surrey, a clinical commissioning group tasked with designing local health services in England, was just fined 200,000 euros after 3,000 patient records were leaked. NHS will now face the arduous task of recovering from the data breach, and […]

Selling Your Idea Up the Ladder

Selling Your Idea Up the Ladder We have all heard the phrase “selling to the C-suite.” This is a very important concept for salespeople who are trying to reach c-level executives, but, this concept also works great for those who are trying to sell their ideas to their boss. Innovation and creativity are present in […]

Insufficient data destruction leads to data breaches, lawsuits.

Insufficient data destruction leads to data breaches, lawsuits. Loose media causes data breach at health care provider. Patients who had their identity and medical records exposed as the result of a security breach in August, have now filed a class action lawsuit against Advocate Health Care for failing to protect their information. The data breach […]

America Recycles Day is November 15th!

  In honor of America Recycles Day (ARD) we wanted to do a blog that focuses on the benefits of recycling. ARD started in 1997 and has been celebrated on November 15th every year since. The purpose of ARD is to promote the benefits of recycling socially, economically and environmentally while encouraging more people to […]

Cell Phone Wiping is Not Absolute

  Continuing with the mobile device security theme we will discuss how remote wiping and other form of cell phone wiping/deleting is not absolute. When wiping an entire phone, only certain parts of the phone, or when deleting contacts/messages/voice mails; the data may not be visible on the device but can still be present. Focusing […]

Server Refreshes Create Data Breach Vulnerabilities

  As Big Data Grows so does the Risk With companies of all sizes moving to cloud computing data centers are playing a bigger role. With this vast increase in data centers come vast increases in purchasing, implementing, removing, and risk. In recent years, 74% of data centers around the globe have added servers to […]