Author Archives: Nancy Sykora

Penetration Testing

Why Penetration Testing is Essential. Servers, applications, remote users and other services, once connected to your network, pose a risk to your organization.  Hackers and malicious users, both internally and externally, may attempt to exploit security weaknesses to gain access to sensitive information assets.

QR Codes

I was checking out Dark Reading, a fabulous site for information security news, and today’s article by Ericka Chickowski, titled “QR Code Malware Picks Up Steam” caught my attention.

Information Security Risk Assessment

A cyber security risk assessment goes beyond running a vulnerability scan and creating a prepackaged report.  A risk assessment is a holistic examination of your security infrastructure, technology, people, and processes to develop a list of organizational risks based on potential business impacts.  Whoa!  Let’s examine that last sentence.

HIPAA Gap Assessment

Let’s talk about HIPAA Gap Assessments.  First of all, what is it?  HIPAA stands for Health Insurance Portability and Accountability Act.  HIPAA (not HIPPA) requires organizations that handle electronic protected health information (another abbreviation for you:  ePHI) to ensure that this information remains secure.