Cost of Data Breach Review
Recognition of information security responsibility is reducing costs of breaches. From time to time I look over the Ponemon Institute reports related to data breach costs to get a feel for the business...
View ArticleHow Much is Your Data Worth?
Everyone knows that a lot of information about each of us is floating around various segments of the internet. The prevalence of online shopping, social media and portable computing has made us...
View ArticleHoliday Security – Manage Your Risks
Welcome to the holiday season! Along with the holiday cheer, parties, presents and spending come some risks of which we should all be aware. Situational Awareness is a phrase that some might not...
View ArticleThe Payment Processing Chain – Holistic Risk Management
A lot of people in the credit card industry focus on the compliance and security component of the payment processing chain that they control. This is expected and is the right thing to do. Most...
View ArticleSecurity as a Subset of Risk Management
What does Risk Management mean to you? If you have read my blog you know that I focus on topics like Security or Compliance. You may have noticed, as well, that my title is Chief Risk Officer and you...
View ArticleHospital Data Breaches
Earlier this month, Lisa Vaas published an article on the Naked Security web site on the Ponemon Institute’s Third Annual Benchmark Study on Patient Privacy & Data Security funded by ID Experts....
View ArticleComparing Managed Service Providers – Full Service versus Service Ready
One component of selling Layered Tech’s managed services is dealing with the competitive comparison issue, as prospective clients attempt to determine which service provider is the best fit for their...
View ArticleData Protection – Not Always a Slam Dunk
It’s March Madness time, one of my favorite times of year. Maybe it’s playing college basketball brackets with friends and co-workers that has me thinking of infrastructure strategy in basketball...
View ArticleTips to Guard Against Hacks and Attacks
I attended the 2013 InnoTech San Antonio Technology Innovation Conference & Expo on April 17th. InnoTech is the region’s largest business-to-business technology event. This conference has grown...
View ArticleETA Eye Openers
At the 2013 Electronic Transactions Association (ETA) Annual Meeting and Expo in New Orleans recently, I had the opportunity to give a presentation on Hacktivism titled Managing Risk for Online...
View ArticleShould You Care About Application Performance Management?
Every customer running revenue-critical business applications should consider adding application performance monitoring and management. For this reason, we have taken our experience deploying...
View ArticleAre Security Fears Keeping You Out of the Cloud?
The First Annual Big Cloud Event took place in Minneapolis, MN in June. Layered Tech was a sponsor of this event, and I delivered a presentation on Big Cloud Adoption. This event was billed as the...
View ArticleHIPAA Security Rule Controls: Do You Have Them?
Recent changes to the HIPAA Rules through the HIPAA Omnibus Final Rule, may affect the way healthcare professionals do business. The changes, which became effective March 26, 2013, now apply the...
View ArticleYou Can’t Handle the Truth
The next time your IT staff comes to you with a server or storage purchase order and says, “And the price is $1 million,” put on your Jack Nicholson mask, do your best “A Few Good Men” impersonation,”...
View ArticleIs It Safe?
Some of you might remember the movie Marathon Man starring Dustin Hoffman as Babe. In it, he is repeatedly questioned by the former Nazi SS dentist, Dr. Christian Szell and asked, “Is it safe?”...
View ArticleWhat You Need To Know About Application Performance Management
I have seen a shift in responsibility for overseeing and managing applications. Application monitoring and management is increasingly moving from application architects and developers and into IT...
View ArticlePreparing for New Payment Card Industry Data Security Standards
The PCI DSS (Payment Card Industry Data Security Standard) is in a release cycle this year, meaning version 3.0 will be released shortly. At this year’s recent Community Meeting of the PCI Security...
View ArticleQ4 Update From Layered Tech CEO Jack Finlayson
I’m excited to update you on the progress and status of Layered Technologies (LT) Inc. as we begin the fourth quarter of 2013. Layered Tech has developed into a complex managed hosting company with our...
View ArticleHooray for HITRUST
It can be difficult to prove whether a cloud or managed hosting provider is certified HIPAA compliant because today no formal process or status exists to verify that claim. The HIPAA Security Rule...
View ArticleStartups That Fly – Layered Tech’s Role
As Director of Compliance and Security services at Layered Tech since 2008, I have seen our Compliant Services business grow significantly during that time. With that growth, there has been a...
View Article