Data Security

  • NIST Compliance: Upholding Security Best Practices in Your Organization

    NIST Compliance: Upholding Security Best Practices in Your Organization The National Institute of Standard and Technology (NIST) is a division in the U.S. Dept. of Commerce. Its main purpose is to define, regulate, and enforce standards in relation to technology. Security is one of NIST’s main objectives, so compliance with its standards is extremely important. […]

    read more
  • What’s Considered to Be “Unsecured” PHI?

    Organizations that handle protected health information (PHI), also referred to as personal health information, have specific requirements under the Health Insurance Portability and Accountability Act of 1996 (HIPAA). One is to report “unsecured” PHI breaches to both the affected patients and the U.S. Department of Health & Human Services. Failure to do so can lead […]

    read more
  • Reasons to Keep Your Tech Serial Numbers Private

    Computers, routers, smartphones, and more all carry serial numbers identifying that individual piece of equipment. When you flip a device over, you’ll likely see several numbers and often barcodes representing those same numbers. There will be a model number that denotes the type of equipment and is the same for every unit produced, and then […]

    read more
  • What Is a Data Risk Assessment?

    If you have data, it’s at risk. That’s the nature of having valuable information that’s of interest to scammers and thieves. Exactly how much real-world risk your data faces is up to you or, more specifically, the defenses you’ve put up. Every organization needs to evaluate its level of risk, and the time to do […]

    read more
  • Have Employees Working from Home? Here Are 5 Data Policies to Implement

    You may have heard about the great pandemic of 2020. It drove many businesses to implement procedures to allow employees to work from home. While this solved a major crisis and kept companies operating, it also created an entirely new problem regarding cybersecurity. Not every company was as rigorous as it should have been regarding […]

    read more
  • 5 Ways to Reduce Unauthorized Access to Sensitive Data

    Your data is precious. Stored in your company’s various documents, workstations, and servers are financial records, customer transactions, passwords and usernames, corporate contacts, and more. There are plenty of thieves and hackers who want that information and will go to great lengths to get it. The scary part is how often they’re successful. There are many […]

    read more
  • Do You Need to Have Your Hard Drive Wiped? Here’s How to Tell

    Keeping up with technological advancements can feel like competing against a cyclist while running a marathon. Just as you think you’re catching up, they fly ahead of you again. Companies, organizations, and individuals must continually update their hardware and software to ensure access to the latest and greatest forms of technology. But what do you […]

    read more
  • Developing Your Employee Handbook: What Workers Need to Know About Protecting Electronic Data

    Every North Dakota business with employees should have an employee handbook to ensure everyone at the company is on the same page regarding expectations like absences, dress code, business ethics, fraternization, and media relations, just to name a few. Another critical policy of any employee handbook should be electronic data protection. Unfortunately, the vast majority […]

    read more
  • Will My Company Be Held Accountable for a Data Breach?

    Data breaches are one of the largest threats facing businesses today. Every year, millions of users of various services lose the personal information that they had entrusted to businesses. These breaches can have serious consequences, especially when they concern financial information. If your business loses customer information that could be used for identity theft, you […]

    read more