Tech content writer specializing in health IT, cybersecurity, and telecoms. Clients include AWS, Redox, Corellium, and many more. I am currently working on my Google Digital Marketing certification.
Dataminr 2024 U.S. Election Security Checklist
Security Operations, Cybersecurity, Public sector
The 2024 U.S. presidential election is turning out to be a race like no other. And regardless which political party wins, it has been deemed a top risk—one that “will be by far the most consequential for the world’s security, stability, and economic outlook,” according to Eurasia Group’s Top Risks for 2024.
In fact, the first major election-related cyber attack has already occurred: a hack into the presidential campaign of GOP nominee Donald T...
What You Need to Know About Generative AI
Imagine you had the ability to call upon thousands of years of human experience, writing, art and media from a single prompt. That is the power of generative AI, a technology that has revolutionized various industries and is poised to be one of the most i...
Your guide to healthcare compliance for small and mid-sized technology organizations
Healthcare compliance has been the subject of much debate for as long as health and human services have existed in the United States and across the globe. While we could sit here and go over the myriad intricacies of laws in the healthcare industry, it would be wiser (and more time efficient) to discuss the impact patient data can have on your organization.
SOC 2 mapping: Infrastructure and data security
With the risk landscape changing every single day due to a number of different reasons like constantly evolving cyber-attacks to changing regulatory requirements, it can be hard enough for organizations to thrive in the modern digital world.
Why every business needs a business continuity and disaster recovery plan
A business continuity and disaster recovery plan will strike many business owners as a ‘nice to have’ rather than a must-have. Or you might think it’s essential for certain business functions (like IT) but less important in others (like PR, Comms, or HR teams.)
We’re here to break the news that you absolutely do need a business continuity and disaster recovery plan for your business. Not having one leaves your business vulnerable to threats — from cyber-attacks to natural disasters.
Your guide to implementing an ISO 27001 backup policy template
Business continuity, data protection, compliance, and disaster recovery are all tied to the ISO 27001 security framework, so not having a backup policy in place in your business continuity plan can spell disaster for your entire organization.
Weathering the storm with Business Continuity and Disaster Recovery (BCDR)
Sometimes it can feel like there are a million different threats to your business operations.
What the Uber Hack can teach us about navigating IT Security
Uber’s security compromise earlier this month is an unfortunate result of concerns left over from an attack the company sustained in 2016 when a pair of hackers outside of Uber accessed user data that was stored on a 3rd-party server.
Understanding UK’s National Cyber Security Strategy to Achieve Cyber Resilience in 2022
The UK National Cyber Security Strategy in 2022 describes the need for a national cyber strategy in the context of defending against growing worldwide cyberattacks. With a goal of firmly establishing the UK as a democratic and responsible cyber power, able to promote its interests as a sovereign nation in a world fundamentally shaped by technology, the nation is pushing the chips forward on whatever it takes to achieve true cyber resilience.
Cybersecurity challenges
In the face of the growing...
Velliv brings certainty, security and performance to pension planning with AppDynamics
Case study that goes into how one pension planner utilized AppDynamics to completely transform business operations from the ground up.
Transforming Healthcare Without Sacrificing Security How enabling private cloud functionality can allow healthcare providers to take an active part in shaping the industry’s ever-evolving digital transformation.
How enabling private cloud functionality can allow healthcare providers to take an active part in shaping the industry’s ever-evolving digital transformation.
Disaster Recovery Planning
A comprehensive disaster recovery (DR) plan is essential to surviving and thriving in the modern
business environment where any unforeseen downtime has major consequences for the overall
customer experience. Unfortunately, many organizations struggle to define exactly what their DR
plan should include or how best to implement it.
This eBook will help you better understand why a bulletproof DR plan is vital to your business’ success and the various components and considerations to account for ...
Sick of Hearing about HCM systems? We get it, and so are we.
We know…you’ve probably searched “human capital management systems” a million times at this point. And there’s no shame in that as a quality HCM investment can save massive amounts of time and money as you continue to transform your organization to keep up with the rapid pace of business today.
The key to a truly transformative investment, however, is choosing an integrated HCM system. But how do you even define what an “integrated HCM system” is, to begin with? How do they work and how are t...
data breaches in healthcare
Under Attack:
Healthcare was the most vulnerable industry to sensitive data breaches across all major attack vectors in 2021:#1 for ransomware attacks #1 for third-party/supply chain attacks #1 for human and system insider errors As the number one sector for the most data breaches for the third year in a row, the healthcare industry reported more than 330 incidents or 18% of 2021’s total data compromises according While the number of industry-related data breaches increased slightly (8%) last...