Phone Number +1-202-802-9399 (US)

Thycotic is now Delinea!   delinea.com

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Compliance and Reporting’

FERPA tells you what, but not how: The first step to being compliant today

April 26th, 2017

In the 1970s the US Government introduced the Family Education Rights and Privacy Act (FERPA).  In short, the act provides guidelines and regulations for when and how an academic institute can share student/parent records with those record owners and 3rd parties.  Much like other regulations (such as HIPAA and PCI), technology continues to have a…


How to meet FISMA Compliance in 9 Steps

November 16th, 2016

Who must meet FISMA compliance, and how do you do it? To protect classified data and mission-critical government systems from cyber attack, the Federal Information Security Management Act (FISMA) mandates that federal agencies (as well as contractors that wish to do business with the federal government) develop, document, and implement a cyber security program. If…


Privileged Passwords and PCI-Compliance

June 2nd, 2016

Guest post from Alpha Generation a Thycotic certified partner who specializes in IT distribution with a focus on proactive security in the UK. Anyone that handles payment card data is affected, so most of us have heard of the Payment Card Industry Data Security Standard (PCI-DSS). It establishes key expectations for protecting cardholder data, whether you’re handling…


The EU General Data Protection Regulation is finalized. What’s it all about?

May 4th, 2016

The new EU General Data Protection Regulation is something that has been going on for several years. It will replace what was previously the European General Data Protection directive from 1995. The idea was to build a consistent foundation across all European Union States so there’s a basic commonality or consistency between what happens with data…


HIPAA: Closing the Gap between Being Compliant and Being Secure with Secret Server

April 26th, 2016

With digital medical records, patient online portals, and other electronic methods of healthcare management, maintaining a secure network is critical to meeting the Health Insurance Portability and Accountability Act (HIPAA) privacy and security requirements. HIPAA’s security requirements are made up of technical security measures, which require covered entities to maintain reasonable safeguards for protecting electronic…


The Top Three Ways Personally Identifiable Information is Leaked in Healthcare

March 3rd, 2015

Personally identifiable information (PII) related to healthcare data is 50x more valuable on the black market than credit card data according to Alert Logic. Forty three percent of all identity thefts in the United States in 2013 were accounted to medical related identity theft (Logic, 2014). The healthcare industry knows they need to protect PII. It’s…


Streamline Compliance with your Internal Security Policy by using Secret Server

March 4th, 2014

Incorporating a new tool into your company’s overall security architecture can be a tricky and time-consuming process. Fortunately, Thycotic Secret Server has a several features that streamline the process of complying with your existing corporate requirements. In this post, we will take a look at a few ways Secret Server can work in conjunction with…