In a universe (not so far away), where passwords like “123456” and “password” reigned supreme, our hero, NIST 800-63B, stepped…
IT Assessment
Measuring Risk The definition of Risk is: risk = likelihood x impact. This formula is not abstract and makes sense….
Receives 23 Months for Falsifying EHR Meaningful Use Attestation TYLER, TX—The former Chief Financial Officer of Shelby Regional Medical Center…
IT Risk Assessment Benefits 1. Documents Due Diligence An IT Risk Assessment provides verification and validation of an organization’s adherence to…
Penetration Test vs. Vulnerability Assessment What I learned in the Sea Services (Marines) is that a ship can carry a…
According to a recent publication by the United States Computer Emergency Readiness Team (US-CERT), they recommend as part of a…
The Payment Card Industry (PCI) Council has updated their guidance on penetration testing. The guidance provides specifics about misconceptions surrounding…
Town of Tewksbury MA Pays to get rid of Ransomware Infection. Here we go again. Looks like the Tewksbury Police…
According to a survey conducted in December and released recently by Sungard, IT professionals believe their organizations aren’t doing enough…
Cisco has identified a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service condition. The…