Quantcast
Channel: Layered Tech Official Blog » Security
Browsing all 28 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Cost of Data Breach Review

Recognition of information security responsibility is reducing costs of breaches. From time to time I look over the Ponemon Institute reports related to data breach costs to get a feel for the business...

View Article


Image may be NSFW.
Clik here to view.

How Much is Your Data Worth?

Everyone knows that a lot of information about each of us is floating around various segments of the internet.  The prevalence of online shopping, social media and portable computing has made us...

View Article


Image may be NSFW.
Clik here to view.

Holiday Security – Manage Your Risks

Welcome to the holiday season!  Along with the holiday cheer, parties, presents and spending come some risks of which we should all be aware.  Situational Awareness is a phrase that some might not...

View Article

Image may be NSFW.
Clik here to view.

The Payment Processing Chain – Holistic Risk Management

A lot of people in the credit card industry focus on the compliance and security component of the payment processing chain that they control.  This is expected and is the right thing to do.  Most...

View Article

Image may be NSFW.
Clik here to view.

Security as a Subset of Risk Management

What does Risk Management mean to you?  If you have read my blog you know that I focus on topics like Security or Compliance.  You may have noticed, as well, that my title is Chief Risk Officer and you...

View Article


Image may be NSFW.
Clik here to view.

Hospital Data Breaches

Earlier this month, Lisa Vaas published an article on the Naked Security web site on the Ponemon Institute’s Third Annual Benchmark Study on Patient Privacy & Data Security funded by ID Experts....

View Article

Image may be NSFW.
Clik here to view.

Comparing Managed Service Providers – Full Service versus Service Ready

One component of selling Layered Tech’s managed services is dealing with the competitive comparison issue, as prospective clients attempt to determine which service provider is the best fit for their...

View Article

Image may be NSFW.
Clik here to view.

Data Protection – Not Always a Slam Dunk

It’s March Madness time, one of my favorite times of year. Maybe it’s playing college basketball brackets with friends and co-workers that has me thinking of infrastructure strategy in basketball...

View Article


Image may be NSFW.
Clik here to view.

Tips to Guard Against Hacks and Attacks

I attended the 2013 InnoTech San Antonio Technology Innovation Conference & Expo on April 17th.  InnoTech is the region’s largest business-to-business technology event. This conference has grown...

View Article


Image may be NSFW.
Clik here to view.

ETA Eye Openers

At the 2013 Electronic Transactions Association (ETA) Annual Meeting and Expo  in New Orleans recently, I had the opportunity to give a presentation on Hacktivism titled Managing Risk for Online...

View Article

Image may be NSFW.
Clik here to view.

Should You Care About Application Performance Management?

Every customer running revenue-critical business applications should consider adding application performance monitoring and management.  For this reason, we have taken our experience deploying...

View Article

Image may be NSFW.
Clik here to view.

Are Security Fears Keeping You Out of the Cloud?

The First Annual Big Cloud Event took place in Minneapolis, MN in June.  Layered Tech was a sponsor of this event, and I delivered a presentation on Big Cloud Adoption. This event was billed as the...

View Article

Image may be NSFW.
Clik here to view.

HIPAA Security Rule Controls: Do You Have Them?

Recent changes to the HIPAA Rules through the HIPAA Omnibus Final Rule, may affect the way healthcare professionals do business. The changes, which became effective March 26, 2013, now apply the...

View Article


Image may be NSFW.
Clik here to view.

You Can’t Handle the Truth

The next time your IT staff comes to you with a server or storage purchase order and says, “And the price is $1 million,” put on your Jack Nicholson mask, do your best “A Few Good Men” impersonation,”...

View Article

Image may be NSFW.
Clik here to view.

Is It Safe?

Some of you might remember the movie Marathon Man starring Dustin Hoffman as Babe.  In it, he is repeatedly questioned by the former Nazi SS dentist, Dr. Christian Szell and asked, “Is it safe?”...

View Article


Image may be NSFW.
Clik here to view.

What You Need To Know About Application Performance Management

I have seen a shift in responsibility for overseeing and managing applications. Application monitoring and management is increasingly moving from application architects and developers and into IT...

View Article

Image may be NSFW.
Clik here to view.

Preparing for New Payment Card Industry Data Security Standards

The PCI DSS (Payment Card Industry Data Security Standard) is in a release cycle this year, meaning version 3.0 will be released shortly. At this year’s recent Community Meeting of the PCI Security...

View Article


Image may be NSFW.
Clik here to view.

Q4 Update From Layered Tech CEO Jack Finlayson

I’m excited to update you on the progress and status of Layered Technologies (LT) Inc. as we begin the fourth quarter of 2013. Layered Tech has developed into a complex managed hosting company with our...

View Article

Image may be NSFW.
Clik here to view.

Hooray for HITRUST

It can be difficult to prove whether a cloud or managed hosting provider is certified HIPAA compliant because today no formal process or status exists to verify that claim. The HIPAA Security Rule...

View Article

Image may be NSFW.
Clik here to view.

Startups That Fly – Layered Tech’s Role

As Director of Compliance and Security services at Layered Tech since 2008, I have seen our Compliant Services business grow significantly during that time. With that growth, there has been a...

View Article
Browsing all 28 articles
Browse latest View live