Blog Listing

Cloud Security Tools: Selecting the Right Solutions and the Right Vendors
In this post, we highlight the five most effective cloud security vendor solutions that thwart the type of malicious activity that threatens the safety of your data.
What to know when pricing VPNs and remote access software
What to know when pricing VPNs and remote access software
Deciding which remote access solution to use is not a simple or quick decision for most people, and it doesn't matter if you work in a large enterprise, a midsized organization, a small business, or on a solo project.
How do I manage my vendors efficiently?
How do I manage my vendors efficiently?
Businesses increasingly rely on vendors to make their operations run smoothly and efficiently. And because of this, many companies have migrated essential business operations to a cloud-based infrastructure. Although this outsourcing makes good business sense since it can save money, dependence on vendors also comes with security risks and operational challenges.
The California Consumer Privacy Act is Coming – Does Your Organization Meet CCPA Compliance?
California’s Consumer Privacy Act (CCPA) goes into effect on January 1, 2020. While that may seem far away, organizations only have a matter of months to align with the legislation to avoid...
Best Practices for Avoiding False Positives for Healthcare Data Security
False positives plague privacy and security professionals everywhere. But what impact do false positives have on healthcare security and how can they be avoided? Find out more here.
Remote access solutions: Which is the most secure?
Remote access solutions: Which is the most secure?
Many organizations face the need to give one or more third-party vendors, as well as employees, remote access to their internal resources. When addressing the need to provide internal (employee) and external (third-party vendor) remote access, an enterprise should compare the primary tools and approaches available for remote support and consider their pros and cons - especially related to maintaining the security of their network.
How much do privileged access management (PAM) solutions cost?
How much do privileged access management (PAM) solutions cost?
Privileged Access Management or PAM solutions are a relatively new breed of tools that allow you to manage credentials with advanced permissions. It’s vital to properly monitor and secure these accounts because they grant access to critical network systems and applications.
Uncovering the Value of Salesforce Event Monitoring Logs
Have you ever wanted to know what your Salesforce users are clicking on? Have you ever needed to know what files your employees are downloading? Normally, uncovering this information is...
Top 3 Healthcare IT Challenges Children’s Hospitals Face
Children’s hospitals are renowned for the expert care they provide. But because of the specialized nature of their services and the vulnerability of their patients, they face unique healthcare IT...
Insider Threat Mitigation: 5 Best Practices from Cybersecurity Experts
Cybersecurity experts Jeffrey DiMuro, Salesforce’s Chief Security and Compliance Architect for Financial Service Industry Team, and Josh Hofer, Stearns Bank’s Chief Risk and Information Security...
How much does remote access cost? 5 factors to consider when pricing a remote access provider
How much does remote access cost? 5 factors to consider when pricing a remote access provider
Determining how much remote access will cost an enterprise is not a simple cut and dry calculation. The reason: different remote access providers may provide a variety of options or deployment models which provide different levels of value to their client companies.
How to avoid a third-party breach in 5 simple steps
How to avoid a third-party breach in 5 simple steps
If a burglar has the key to your house, having a state-of-the-art lock won't keep them out. That's exactly what happens when you allow third parties onto your network with privileged credentials without a solution that provides proper identity, access, and audit controls.
Monthly Healthcare News Roundup: Class Action Lawsuit Against Google, Denial of Drug Diversion at Practitioners’ Own Facilities, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn more about a class action lawsuit against Google, how healthcare executives...
Monthly Cloud Security Roundup: NASA Security Hack, Chaos in Silicon Valley, and More
Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss a NASA security hack, Maine’s internet...
New Cybercrime-Fighting Unit to Enforce New York Cybersecurity Regulations for Financial Institutions
The Wall Street Journal recently reported that a newly-founded crime-fighting cyber unit will begin enforcing security rules laid forth by New York cybersecurity regulations. The primary role of...
3 Ways Stony Brook Medicine Transformed its Privacy Program Using AI in Healthcare
Stony Brook underwent a transformation using AI that enabled their healthcare organization to reduce security expenses and time wasted trying to uncover bad user activities. Find out how in this post.
How to design and implement a vendor management process
How to design and implement a vendor management process
Whether you’re a small business or a global enterprise, over the last decade or so outsourcing business functions to third-party vendors has become essential to your business operations. Vendors are used in nearly every business process.
Real-Time Event Monitoring: What’s New in Salesforce’s Summer 2019 Product Release
Eagerly anticipated by Salesforce users every season, the newest product release for 2019 brings exciting updates for Salesforce’s Event Monitoring tool. Primarily used to gain visibility in...
Six essentials of company data security
Six essentials of company data security
The list of companies that have had their data security breached seems endless: Target, Facebook, T-Mobile, Marriott, Quest Laboratories, Quora, Equifax and on and on and on. It’s no wonder that a recent study by Cisco showed that 31% of organizations have, at some point, encountered breaches of their data security infrastructure.
The NIST CSF Framework – What Does it Mean for Healthcare?
NIST, the National Institute of Standards and Technology, is a non-regulatory federal agency of the U.S. Commerce Department. Established in 1901, NIST was designed to promote innovation and...