Posts Tagged :

Aurora

Cyber Insurance – Why Insuring Your IT Infrastructure is a Must

Target…Neiman Marcus….Home Depot….and now Chase, Cyber Breaches are now a mainstay of Corporate America and will be for a long time to come. Although the first few IT Security breaches had caused uproar in the media and panic within the general public, it seems that as of now, these breaches are commonplace and even expected…

read more

EAR Compliance and Data Classification Pt. II; Categorization

Equally important as classifying EAR Sensitive data, is categorizing it. Once data is deemed as sensitive or non-sensitive, an organization must apply a set of categories that will differentiate data based on confidentiality and authorization. While it’s understood that an inherent rule of EAR compliance demands that EAR Sensitive data not be seen by non-US…

read more

TrueCrypt Alternative for Small Businesses

                                                                 There is a lot of recent buzz around TrueCrypt Alternatives and speculations on why the developers of the encryption freeware took their site down, etc. All hype aside, TrueCrypt will return as a viable option for individuals to send encrypted files to one another and to encrypt volumes…

read more

Aurora Releases ITAR Compliance Best Practices White Paper for Data Security

Aurora has released a comprehensive white paper on ITAR Compliance Best Pratices for Data Security. As ITAR Compliance becomes further intertwined with the IT world, it is important to understand how to keep your organization protected and compliant with ITAR guidelines to avoid costly breaches and penalties. Stay in the know with Aurora’s ITAR Compliance…

read more

Data Security Best Practices for ITAR Compliance

What can organizations do to protect data with regards to ITAR compliance? We listed a short, summarized list below that can help organizations with ITAR compliance through some data security best-practices. It is important to understand that data security is not an end result, but a continuous journey in protecting your information assets. We implement…

read more

The Path to HIPAA Compliance

         The path to HIPAA compliance has many variables, and includes several different assessments, but fortunately there are services available to assess your business with respect to HIPAA standards. Risk Assessment:      A useful tool which has helped point numerous organizations in the right direction for compliance is a “HIPAA Risk Assessment”. Risk Assessments are…

read more