
In the 1970s the US Government introduced the Family Education Rights and Privacy Act (FERPA). In short, the act provides guidelines and regulations for when and how an academic institute can share student/parent records with those record owners and 3rd parties. Much like other regulations (such as HIPAA and PCI), technology continues to have a…
Who must meet FISMA compliance, and how do you do it? To protect classified data and mission-critical government systems from cyber attack, the Federal Information Security Management Act (FISMA) mandates that federal agencies (as well as contractors that wish to do business with the federal government) develop, document, and implement a cyber security program. If…
Guest post from Alpha Generation a Thycotic certified partner who specializes in IT distribution with a focus on proactive security in the UK. Anyone that handles payment card data is affected, so most of us have heard of the Payment Card Industry Data Security Standard (PCI-DSS). It establishes key expectations for protecting cardholder data, whether you’re handling…
The new EU General Data Protection Regulation is something that has been going on for several years. It will replace what was previously the European General Data Protection directive from 1995. The idea was to build a consistent foundation across all European Union States so there’s a basic commonality or consistency between what happens with data…
With digital medical records, patient online portals, and other electronic methods of healthcare management, maintaining a secure network is critical to meeting the Health Insurance Portability and Accountability Act (HIPAA) privacy and security requirements. HIPAA’s security requirements are made up of technical security measures, which require covered entities to maintain reasonable safeguards for protecting electronic…
Personally identifiable information (PII) related to healthcare data is 50x more valuable on the black market than credit card data according to Alert Logic. Forty three percent of all identity thefts in the United States in 2013 were accounted to medical related identity theft (Logic, 2014). The healthcare industry knows they need to protect PII. It’s…
Incorporating a new tool into your company’s overall security architecture can be a tricky and time-consuming process. Fortunately, Thycotic Secret Server has a several features that streamline the process of complying with your existing corporate requirements. In this post, we will take a look at a few ways Secret Server can work in conjunction with…