Wireless Access Security Policy
Posted in Best Practices Checklist How-To Policies & Procedures

Wireless Access Security Policy – Best Practices

Wireless networks have become mainstream and are being widely deployed throughout many different environments; however, special considerations should be made in deploying a wireless network….

Continue Reading... Wireless Access Security Policy – Best Practices
Access Control Best Practices
Posted in Best Practices How-To Policies & Procedures Security Program

Access Control Best Practices

Why is access control important? Without proper access control, unauthorized users could obtain confidential information and misuse it, and authorized users could fail to follow…

Continue Reading... Access Control Best Practices
Antivirus Policy Best Practices
Posted in Best Practices How-To Policies & Procedures Security Tools & Solutions

Antivirus Policy and Procedure Best Practices

The primary purpose of the anti-virus solution or software is to guard against malicious software or scripts by blocking or quarantining this software that is…

Continue Reading... Antivirus Policy and Procedure Best Practices
BYOD Security Best Practices
Posted in Best Practices How-To Policies & Procedures Security Program

Mobile Device or BYOD Security Best Practices

This article will provide some guidance and best practices for the use of, and security for, remote access and mobile device technology (e.g. BYOD) that…

Continue Reading... Mobile Device or BYOD Security Best Practices
Firewall Security Best Practices
Posted in Best Practices How-To Policies & Procedures Security Tools & Solutions

Common Firewall Security Best Practices

Firewall security devices, including routers and Intrusion detection and/or prevention systems, play a critical role in system of controls to prevent and detect unauthorized access…

Continue Reading... Common Firewall Security Best Practices
Application Development Security Best Practices
Posted in Best Practices How-To Policies & Procedures Security Program

How To Prevent Application Vulnerabilities and Breaches

Any applications developed internally or outsourced should follow secure coding practices to prevent common vulnerabilities and potential data breaches. The application’s design and implementation should…

Continue Reading... How To Prevent Application Vulnerabilities and Breaches
How to Comply with GDPR
Posted in Best Practices Compliance Program GDPR How-To

GDPR Explained In Plain English

What is the GDPR regulation and when did it passed? The EU General Data Protection Regulation, or GDPR for short, is a sweeping regulation passed…

Continue Reading... GDPR Explained In Plain English
Medical Device Security Best Practices
Posted in Best Practices Compliance Program How-To Policies & Procedures Risk Management Security Program

Medical Device Security Best Practices

Medical devices improve health, quality of life, and even save lives. As such, medical device use must be appropriate for the context and setting in…

Continue Reading... Medical Device Security Best Practices