There is no silver bullet, no panacea when it comes to thwarting Phishing and Spear Phishing! There are many strategies, methods, tools, techniques, policies and procedures that can create an effective layered defense protocol to prevent most Phishing attacks. It’s takes time, patience, persistence, training and proper execution. Morphing your computing systems environment into a more secure posture, will require you investing a reasonable amount of time and some money.…
Read MoreWhat’s a Data Breach
Breach as defined by HHS
From the HHS.gov website: Definition of Breach A breach is, generally, an impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected health information. An impermissible use or disclosure of protected health information is presumed to be a breach unless the covered entity or business associate, as applicable, demonstrates that there is a low probability that the protected health information has been…