Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

16 Hospitals Lose Data in Prospect Medical Holdings Breach

Prospect Medical Holdings is an umbrella company with over 16 separate hospitals throughout Pennsylvania, California, Rhode Island, and Connecticut. The company manages a huge amount of information between all those different hospitals, and all that data could easily be misused if the wrong individuals accessed it. Prospect Medical Holdings was recently the victim of a data breach, though the company itself did not announce that information to the world.

What Makes a Strong Password?

A strong password is made up of at least 16 characters and contains upper and lower case letters, numbers and symbols. Strong passwords also follow password best practices so they never contain personal information, dictionary words or phrases, and are never reused across multiple accounts. Continue reading to learn why strong passwords are necessary and tips for creating a strong password.

"Flying Under the Radar:" How to Protect Your Organization's Reputation

Over 72 percent of Indian citizens think their personal data has been compromised, according to a recent article in Business Today. They blame a variety of organizations and institutions, which is understandable. Now imagine your organization is the one to blame. Could your company survive this type of hit to its reputation? Would it be able to retain customers who no longer trust you to keep their sensitive information secure?

Coffee Talk with SURGe: 2023-SEPT-05 Mudge Joins CISA, Qakbot Takedown, Infamous Chisel Malware

Grab a cup of coffee and join Mick Baccio, Ryan Kovar and Audra Streetman for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: Mick and Ryan competed in a 60 second charity challenge to share their favorite hack of all time before a deep dive on extortionware vs. ransomware.

Becoming FedRAMP and StateRAMP Authorized, Part 2 - Common FedRAMP Mistakes You Can Avoid

August 31, 2023 By Isac Hur, Senior FedRAMP/ StateRAMP/ CMMC Practice Lead and Quality Assurance As a compliance auditor and practitioner in the FedRAMP space, I see a lot of mistakes cloud service providers (CSPs) make that cause them a tremendous amount of grief when seeking authorization. The process is painful enough on its own, but many of the people you hear venting frustration have made missteps.

Cybersecurity Should Not Be Under IT Department

We delve into a critical flaw that continues to persist within many organizations—the subservience of cybersecurity teams to their overarching IT counterparts. Join us as we unpack the challenges stemming from this hierarchy and explore the urgent need for a transformative shift. 🔒 Subordination No More: It's disheartening to witness security teams relegated to a subordinate role within IT departments. The pervasive 'can we' versus 'should we' dilemma underscores a bigger issue that hampers our collective progress.

Tips and Tools for Open Source Compliance

You don’t need us to tell you that open source software is becoming a very significant percentage of commercial software codebases. Open source components are free, stable, and enable you to focus your resources on the innovative and differentiated aspects of your work. But as the use of open source components increases, compliance with open source licenses has become a complex project of growing importance. So how can you stay on top of compliance and what tools are out there to help?

Understanding the Principle of Least Privilege in 2023

The principle of least privilege is a crucial element in keeping data secure from malicious users and cyberattacks. This concept puts restrictions on access rights so that only necessary privileges are provided to applications, systems, and users for them to carry out their duties. By incorporating this measure into various platforms/environments, it greatly reinforces cybersecurity as well as the protection against unauthorised use or misuse of information.

PCI DSS Requirement 4 : Summary of Changes from Version 3.2.1 to 4.0 Explained

In this video, we at VISTA InfoSec provide a detailed summary of the changes made to PCI DSS Requirement 4 from version 3.2.1 to 4.0. Our expert, Narendra Sahoo, explains the key differences and what they mean for your organization’s compliance with the Payment Card Industry Data Security Standard (PCI DSS). As a leading provider of service and consulting services, VISTA InfoSec is committed to helping our clients navigate the complex world of information security and compliance. Watch this video to learn more about the changes to PCI DSS Requirement 4 and how they may affect your business.