By Luke Willadsen
As many organizations move to a remote-work posture due to the rapid spread of COVID-19, it’s important that those responsible for IT and IT security can ensure their organization’s remote work policies and technologies are securely implemented and capable. No two organizations are alike, and exact security requirements are unique to your organization.
The bottom line is that remote work technologies and policies should be designed to prevent unauthorized access to your network, systems, and confidential and/ or proprietary data. There is no on-size-fits-all approach to this, organizations must develop a true understanding of their threat profile to better determine which security controls are right for them.
By Bradley Wolfenden
Part 2- Top 5 Things to Keep in Mind as You Implement Remote Work Policies
It’s likely that by now you’ve either heard of or have been personally impacted by recent cancellations of major industry conferences, closed campuses, travel limitations, or remote work mandates as a result of the continued spread of the novel Coronavirus (COVID-19). All of these actions are a reflection of the Center for Disease Control’s recommendations and proactive efforts focused on lessening the spread and impact of this virus.
By Bradley Wolfenden
Part 1- The Coronavirus Isn’t Just Taking a Toll on Healthcare Patients
Preying on fearful, distracted and overworked individuals during times of global concern is a tried-and-true tactic for cyber criminals. And as news around the spread of the Coronavirus (COVID-19) continues to dominate headlines, malicious actors across the world are licking their chops at the opportunities this pandemic presents for planning and launching targeted and timely cyber-attacks.
By Bradley Wolfenden
Cyberattacks on businesses do more than violate laws and regulations. Insufficient investment into cybersecurity best practices can lead to devastating consequences to the victim company’s reputation, business continuity, and growth opportunities. One of the most vulnerable windows during which malicious actors target enterprise networks is during a merger and acquisition (M&A) process. In these cases, a successful compromise can hamper or even kill these efforts by reducing the value of the target’s assets, tarnishing its brand and ultimately derailing the acquisition as a result.
By Adrian Gerber
We recently explored the growing data storage options for organizations in the healthcare industry, such as cloud migration or a hybrid of cloud and on-premises. Regardless of which option an organization chooses, there are many factors to consider when moving data to the cloud to ensure the entity is HIPAA compliant and HITRUST certified.
Understanding the compliance-related pros and cons of both cloud and on-premises storage will help healthcare organizations create the infrastructure that fits their particular needs, addresses compliance and certification, and reduces the risk of a breach that can be costly from a financial and reputation standpoint.
By Jimmy Bayne
Microsoft Teams Rooms (MTR), formerly known as Skype Room System and Lync Room Systems, is the latest and greatest solution from Microsoft for managing online collaborative meetings. In many businesses across the globe, a Teams Rooms console (“Teams console”) is the lifeblood of the conference room. The console typically consists of a supported computer system, management dock, camera, and output device(s). The Teams Room application suite runs on Windows 10 Enterprise or Windows 10 Enterprise IoT.
For offensive security testers, this post will cover a simple case where attacking Teams gear may be beneficial when conducting a physical or internal penetration test. For defenders and system administrators, this post will highlight opportunities to reduce the attack surface of your expensive, often forgotten conferencing equipment. Let’s get started…
EmberSec is headed to HIMSS! And while the conference is a phenomenal opportunity to network with colleagues and pick up the latest in marketing swag, there is much to be learned from the various speaker sessions, workshops, forums, and seminars. Here are a few we’ve bookmarked as can’t miss from the HIMSS 2020 agenda, including one of our very own.
By Adrian Gerber
The massive market shift from on-premise services to the cloud rolls on. And for the healthcare industry, a decision to jump on board with this kind of migration is more complex than simply choosing a cloud provider. Yet in order to stay competitive in a world of resilient, agile, and rapidly accessible infrastructure and interoperable data, healthcare providers, device manufacturers, prescription drug companies and many others are driven to pursue new and different storage and hosting solutions.
EmberSec is headed to HIMSS! In addition to our exhibitor presence and participation at both the Cloud Forum and Cybersecurity Forum, By Light CTO, Ken Jenkins, alongside Jimmy Bayne, Security Consultant, EmberSec, will be delivering a session on how to improve your security controls with features underutilized in many enterprises. The session "Enhancing Security Controls with Application Whitelisting," is scheduled to be held on Thursday, March 12th in Cybersecurity Theatre 1 from 10:15a – 10:35a. Attendees of this session will be entered to win a set of Apple AirPods, to be given away at the conclusion of the talk.
Join EmberSec in Orlando, FL at the HIMSS Global Healthcare Conference from March 9th - 13th!
About HIMSS: HIMSS is a global advisor and thought leader supporting the transformation of health through the application of information and technology. As a mission driven non-profit, HIMSS provides thought leadership, community building, public policy, professional/ workforce development and engaging events to bring forward the voice of our members. HIMSS encompasses more than 80,000 global individual members, 630 corporate members, and over 450 non-profit organizations.