Your Cybersecurity news & updates
July 20, 2016
Human Factors (Security | Insecurity) on your mind   

When designing security systems, it is vital to factor the human into the equation, otherwise you end up with confused users and vulnerable systems. In computer systems and network design, human factors impinge on your system in numerous ways: positively, negatively, and maliciously. If humans are the weakest link, they are also the most flexible solution. Humans will always make mistakes. However, systems will not always be able to identify or correct those errors. If you took humans out of the equation altogether, could you build a secure computer system? 

The scourge of social engineering   

Social media platforms such as Twitter, Facebook and LinkedIn increasingly are being used by companies to engage with customers, build their brands and communicate information to the rest of the world. But social media for enterprises isn't all about "liking" and "friending".  For organizations, there are real risks to using social media, ranging from damaging the brand to exposing proprietary information to inviting lawsuits. What steps can organizations take to make sure employees practice safe social media?

How tabletop exercises can help uncover hidden security risks   

Tabletop exercises are a low cost way to identify security risks in an organization where the goal is to get members from several different teams together and examine existing operational plans and determine where they can make improvements when responding to the hypothetical incident. This exercise involves reviewing roles, responsibilities and response efforts required to respond to a given security incident.

  • How do you conduct this exercise and how often?
OCR Launches Phase 2 of HIPAA Audit Program 

To assess compliance with the HIPAA Privacy, Security and Breach Notification Rules, the HHS Office for Civil Rights (OCR) has begun its next phase of audits of covered entities and their business associates. 

  • The first round of desk audits will focus on covered entities.
  • 167 health plans, healthcare providers and clearinghouses are notified via email on July 11 for desk audits.
  • These entities have 10 business days to respond to the document requests.
  • The second round of audits will focus on business associates which will follow in fall.
Upcoming Events
UAB’s 36th National Symposium for Healthcare Executives
July 28, 2016
24By7Security Sponsoring & Founder Sanjay Deo Speaking at   Sandestin Golf and Beach Resort, Destin       ...
5th Annual ITPalooza South Florida
Dec 8, 2016 

24By7Security Sponsoring & Founder Sanjay Deo Speaking at    Signature Grand, Fort Lauderdale...
About us
24By7Security, Inc. is a full service Cybersecurity strategy, implementation, operations and training firm.  We provide Cybersecurity and compliance related services across all functions of the enterprise. Our services include  CFPB/DFA, FIPA, FERPA, GLBA, HIPAA, PCI, SOX, and others.
  24By7Security, Inc.

(844)55-CYBERcontact@24by7security.com | www.24By7Security.com