What is User and Entity Behavior Analytics?
UEBA is an increasingly essential part of every security plan – but it may seem more like a buzzword than a process you actually understand. We’re here to demystify UEBA security and explain how it works.
UEBA is an increasingly essential part of every security plan – but it may seem more like a buzzword than a process you actually understand. We’re here to demystify UEBA security and explain how it works.
When election interference is discussed, you probably think of “fake news” social media plots or hacked voting machines that manipulated outcomes. The truth is much more complicated. Election interference can come in many forms and have consequences that last long after an election cycle. Fortunately there are security measures elected officials, campaigns, and anyone with access to voter information can – and should – take to defend against election interference.
We all know information security is complicated and multi-faceted. You have plans to defend you from countless types of attacks and threats, but the risk is still there. Spear phishing is a common threat and your organization should have a plan of how to respond in the event of this type of attack.
In 2017, ransomware attacks increased by 90 percent, making it the most prevalent variety of malware. Every organization should be thinking about ransomware protection and detection – because proper security is always more prudent than the costs of a ransom or lost time and data. Ransomware is changing and evolving – and so are network security offerings. Here are a few things you need to know to protect your business against a ransomware attack.
Many industries have sweepingly digitized their documentation in the name of efficiency – substantial efficiency. The healthcare industry created the electronic health record (EHR) in the name of efficiency as well (among other benefits). But EHRs are far from universal in the medical space. While some hospitals and practices are simply slow to adopt modern practices, the greatest barrier to the universal adoption of electronic health records is privacy and security.
This summer, California passed groundbreaking privacy rights legislation through the California Consumer Privacy Act. The law takes effect January 1, 2020 but companies need to have data tracking systems in place by the beginning of 2019. Even if your business is not located in California, you may be liable - so here’s everything you need to know to get your data security compliant.
Clinical trials are a crucial step in developing new life sciences products such as drugs and medical devices. All tests – whether with large or small groups of people – require medical and personal information from patients upfront, and then proceed to collect data throughout the process. Ultimately, research companies are responsible for large sets of sensitive data and securing that information should be a top priority.
We recently discussed data security requirements for federal contractors and now we are doing a deeper dive into one of the trickier compliance factors: reporting cyber incidents.