TechR2

After a data breach, an insurance company doesn’t know what hit them.

After a data breach, an insurance company doesn’t know what hit them. Really? A large insurance company had to hire a legal firm as part of an investigation of their own data security system. Last fall the insurance giant fell victim to a cyber attack, which compromised the personal information of over a million customers […]

When they audit your data security, what will they find?

When they audit your data security, what will they find? Data breach at Minnesota’s new health insurance exchange. An auditor can come snooping around your company at any time. Depending on the circumstances, he/she may be in a bad mood. You need to be prepared. An employee at MNsure, Minnesota’s new health insurance exchange, emailed […]

Apple’s New data security method is hacked in days

Apple’s New data security method is hacked in days We all recognize that it’s crucial to protect the private information of your customers and your company. That’s why some of the world’s best minds are exploring the most creative means of defending against data breaches, large and small. The problem is, some of the world’s […]

University spends time and money to recover from data breach

University spends time and money to recover from data breach Does your company have a sophisticated data security system void of holes and weaknesses? Or does your network leak? Is your system fortified by state of the art, environmentally responsible data destruction practices? Or is your philosophy on a data breach disaster: “It won’t happen […]

Data destruction company is responsible for data breach.

Data destruction company is responsible for data breach. Not all data destruction services are created equal. NHS Surrey, a clinical commissioning group tasked with designing local health services in England, was just fined 200,000 euros after 3,000 patient records were leaked. NHS will now face the arduous task of recovering from the data breach, and […]

TechR2 Achieves ISO 27001 Certification!

TechR2 Achieves ISO 27001 Certification! When your company works with a consultant or vendor for data security, you can’t afford for that vendor to have mediocre management practices. And if you are trusting someone else with your IT security, they had better be top notch. An easy way to objectively measure effectiveness and security is […]

Time Management Essentials for IT Professionals

Time Management Essentials for IT Professionals You probably have a to-do list on your desk right now, right? Most people would admit to having one, which is a great habit. For IT professionals a to-do list can be easy to make but impossible to complete. It seems like there is always someone asking something from […]

OHSU violates its patients’ HIPAA rights.

OHSU violates its patients’ HIPAA rights. HIPAA violations are not taken lightly; whether it was your fault or not, your company could be held responsible for any data breach that compromises the private information of your customers. Oregon Health & Science University (OHSU) found this out the hard way. OHSU had to notify over 3,000 […]

Insufficient data destruction leads to data breaches, lawsuits.

Insufficient data destruction leads to data breaches, lawsuits. Loose media causes data breach at health care provider. Patients who had their identity and medical records exposed as the result of a security breach in August, have now filed a class action lawsuit against Advocate Health Care for failing to protect their information. The data breach […]

Cloud Security Alliance identifies new data security risks

Cloud Security Alliance identifies new data security risks The Cloud may be a hole in your data security. As concerns grow regarding how secure your data really is when stored in the Cloud, the industry must react. The Cloud Security Alliance (CSA) has made additions to the guidelines of its Cloud Control Matrix (CCM). This […]