Deploying a HIPAA Compliant Encryption Policy

2015-08-06 16_53_39-Hipaa.jpg (JPEG Image, 950 × 500 pixels)HIPAA, or the Health Insurance Portability and Accountability Act, presents a fairly robust set of standards and rules that any organization within the United States handing PHI (Personal Health Information) are compelled by law to address.

On the surface, many of HIPAA’s rules appear strait forward, but as I […]

Cybersecurity Controls for the Manufacturing Environment

The endless barrage of cybersecurity attacks and data breaches in recent history is cause for concern for every company in every industry including manufacturers. Perhaps especially manufacturers – since manufacturing may be the only industry where a cyber-attack may result in explosions or even car crashes. For example, in 2014 attackers disrupted the plant control […]