TechR2

Studying of the Use of Digitalization

Lately, I was examining a recent graph report about the number of aviation accidents relative to the 1990’s period of digitalization, and they revealed the following: Aviation incidents started to decline and continues to shrink to this day. And you can see on the same graph, that from the 1940s to the 1980s, accidents and incidents were on the rise. One could surmise that digital aviation systems and quality training do pay off.

End of Life Compliance

Unsecured Physical Security of Data Bearing Devices (DBDs) that hold thousands to millions of protected records for Health information (PHI), Personally Identifiable Information (PII), or Sensitive Personal Information (SPI) leaves many companies non-compliant.

Compliance: Privacy Regulations Based on Industry

Compliance: Privacy Regulations Based on Industry [vc_row][vc_column width=”1/3″][vc_column_text]Protecting your brand and reputation is crucial to every organization as the number of data breaches is constantly on the rise. There are guidelines already in place for most organizations. Learn more about your industry’s regulations for data security. Do you accept payment via credit card? PCI, The […]

Lessons Learned at Business of Security Event

Lessons Learned at Business of Security Event Last week members of the TechR2 team had the opportunity to interact with a group of seasoned Information Security leaders at a Business of Security networking event. We had a great time learning from special guests: Cindi Hart, Kim L. Jones, Kent King, Larry Mead, Mike Scott, and […]

Is it IT’s job to convince their execs to prioritize data security?

Is it IT’s job to convince their execs to prioritize data security? [vc_row][vc_column width=”1/4″][vc_column_text]A recent blog post in Tech Republic cites an enlightening Ponemon Institute report about the effectiveness of security metrics. As it turns out, great security metrics typically don’t drive companies to enhance security. Why? It’s no surprise that IT people either feel […]

Is your CEO criminally liable if discarded data devices aren’t clean?

Is your CEO criminally liable if discarded data devices aren’t clean? IT professionals are often frustrated by CEOs and corporate executives who don’t prioritize data security. This is frequently a case of priorities and personalities rather than rational decision making. Last week we wrote about corporate executives imprisoned for improper disposal of technology waste. This […]

Retiring point of sale terminals? Protect your data.

Retiring point of sale terminals? Protect your data. We’ve all been to the grocery store, tried to sign the screen for our credit card purchase, and watched as our careful signature is rendered as an illegible scrawl. In-store credit card terminals and point of sale (POS) terminals don’t last forever. But what happens when they […]

Back to School: Is your student data safe?

Back to School: Is your student data safe? Families everywhere are preparing their students to go back to school, and the schools themselves are preparing themselves for the student invasion. But are schools prepared for the student data security challenges? Anyone who has a student knows that sensitive data, such as social security numbers and […]

Patient data safety: Don’t leave it to the laundry department!

Patient data safety: Don’t leave it to the laundry department! Twice this spring, sensitive medical data from major New York hospitals were copied onto flash drives, exposing patient medical data to anyone who might find the drives. These were not spent server hard drives or sophisticated backup drives. These were simple flash drives — the […]

Middle school teachers aren’t data security agents. They need help.

Middle school teachers aren’t data security agents. They need help. Earlier this year in a small town in Georgia, a middle school teacher saved a spreadsheet of student data from a school computer onto a flash drive, so she could take it home. The teacher left the flash drive in her car. You can guess […]