As of Dec. 31 2017, contractors that store, transmit, or process certain types of government information were required to comply with DFARS (Defense Federal Acquisition Regulation Supplement) regulations.
ProCircular Team
Recent Posts
A Simple Primer on DFARS NIST 800-171a Regulations
Topics: DFARS
Do IT and Cybersecurity Go Hand in Hand? Not Always …
Bring a room full of school officials together, and what do you hear? If you’re a school board member, superintendent, or administrator, you already know: Information security is top of mind.
That’s the message we heard at the recent Iowa Association of School Boards event in Des Moines in late November.
Officials are aware of cyber threats – and they want to do something about it. They just need a good place to start. Some worry that the “Iowa nice” factor makes schools in the state an easier target, but they’re no more – or less – vulnerable than any other organization or institution.
Industry Trends
Cybersecurity in the healthcare field has gone through a lot changes the past few years. In 2016 there was a significant jump in the total number of healthcare specific cybercrimes. According to SecurityIntelligence there was a 71% increase of confirmed data breaches in the healthcare sector from 2015 to 2016. Drilling down on that increase revealed that most of the jump was from external (aka "hacking" or ransomware or malware") followed by internal non-malicious (aka accidents from insiders). Trends are showing that cybercriminals have found more value in healthcare data and the potential for long term use is much higher because it is more difficult to change an individual’s "health data". Another eye-opener is that the type of healthcare entities affected is not limited to hospitals. Business associates, specialized care providers and healthcare plan have all been targets for cyber crime. Oncology, anesthesiology, orthopedic, and radiology are a few of the specific entities that were in the top 10 largest healthcare breaches of 2016. This data tells us that cybercriminals will target or find data outside of the large medical providers and may even be targeting the organizations that have lagged behind in implementing security controls.
Topics: Cybersecurity, Network Security, HIPAA, Information Security, Data Security, healthcare
Cybersecurity Insurance for C-Level Executives
For any business leader or CIO, navigating the world of cybersecurity insurance can be very complicated. It seems as if there are often more questions than answers, it can be difficult to know who you need to speak to in order to get what you need. This article will attempt to provide some direction, point out a few of the pitfalls, and help you to ask the right questions within your organization.
Topics: Cybersecurity, cybersecurity insurance, insurance, it risk assessment
As strong as the weakest link
You probably know that having network security in the workplace is important, but what about your home? Most people use their home internet connection for everything from finance to important personal correspondence, all of which should be secured to the individual. In this blog post we will explore some simple tricks that will help you make your home network more difficult for intruders to access.
Topics: Cybersecurity, consumer security, Data Security