23Feb
26Jan
How to prepare for a HIPAA technical risk assessment or audit
I have had to help a number of smaller-sized health services clinics with this kind of thing recently, so I figured a place to collect notes on these experiences was in order. Hopefully others will find it valuable; just know that there is no such thing as "HIPAA compliant"--no auditor...
13Oct
Top Mobility-Enabling Security Features in Office 365
At this point, even the staunchest conservatives among us have to admit that we live in a post-perimeter world. In recent years there have been even more developments and trends chipping away at our traditional conceptions of so-called perimeter-based security. Cloud and mobility means two things: Users can go straight to the...
03Oct
How to secure your BYOD Windows 10 Device
I do not want to confuse anyone too much with this post. So let me begin with a clear disclaimer: I am not suggesting that we abolish Active Directory and encourage open BYOD across our small and mid-sized enterprises. Active Directory and Group Policy still provides the best means of securing your...
24Mar
It Could Still Happen to You: How to Get Through a Digital Recovery Effort
You can never assume that you’re safe just because you’re sitting behind a next-generation firewall and some fancy, expensive security software. If you’re familiar with my post about not being an Internet idiot, then congratulations, you have all the information you need to be way safer than about 95% of...
24Mar
What is Advanced Threat Analytics?
Advanced Threat Analytics (ATA) is a security product from Microsoft that is included with the Enterprise Mobility Suite (EMS) subscription. Unlike most of the other EMS components that tend to be a bit more cloud-centric, ATA is an on-premises-based security solution that helps identify Advanced Persistent Threats (APT's) and insider threats before they can cause...
21Mar