The Significance of Implementing NIST 800-171 for Companies
In an era characterized by rapid technological advancements, interconnected networks, and increased digitalization, the security of sensitive information ha ...
1.5 Million Reasons to get a HIPAA risk assessment
Back in 2016, a hacker had gained access to Athens Orthopedic Clinic (Athens, GA) and stolen over 200,000 patient records that included names, dates of birth, ...
Stay secure while working from home
Crain's Cleveland - April 20, 2020 Brett KimmellAbdullah Alkhulaiwi Brett Kimmell and Abdullah Alkhulaiwi share helpful tips with Crain's Cleveland reade ...
Top INFOSEC Considerations for Healthcare Organizations
Brett Kimmell provides tips for healthcare organizations dealing with information security.
EU is Implementing New GDPR Cybersecurity Standards. What They are and Why You Need to Pay Attention
With or without Britain, the European Union is about to implement broad-based data privacy and security business standards across all 28-member countries. The ...
Want DoD Contracts? Comply with DFARS by the End of the Year
After a two-year delay, the US Defense Department is finally implementing the data security requirements of Defense Federal Acquisition Regulation Supplement ( ...
Your Text Messages Can be Hacked, Too
Back in 2014, the television program ran a report on a vulnerability in cell phone services that can allow hackers to access, and even text to and from, a smar ...
October is National Cyber Security Awareness Month
Although every month (and week and day) at Kimmell Cybersecurity is Cyber Security Awareness month, the federal government declares every October National Cybe ...
From the Equifax Hack to the Blockchain: Online Database Security is the Issue
By this point, you know about the latest in criminal enterprise hacking. The Equifax hackers absconded with personal data on nearly 150 million people, causing ...
The Latest on Ransomware
In the last few weeks, computer networks around the world have been invaded by three destructive “ransomware” attacks, all of which work differently: WannaCry, ...