Cyber security news & events blog

Check out the latest trends, events, and stories relating to cyber security and privacy.

What is the Difference Between 2FA and MFA?

What is the Difference Between 2FA and MFA?

Webster’s dictionary defines the term “Security” as the state of being protected or safe from harm. In relation to online security nothing screams protection more than authentication, and what’s a better way to authenticate a person’s identity than requiring them to...

What is TLS Encryption?

What is TLS Encryption?

Email services such as Gmail and Outlook continue to reign supreme in day-to-day business communication. While vanilla text exchange (unencrypted email) is by far the most popular in traditional email applications, this model's drawback leaves users vulnerable to data...

What is the HIPAA Security Rule?

What is the HIPAA Security Rule?

Established in 2005, the HIPAA Security rule introduced national standards to safeguard electronic personal health information and ePHI. Any electronic health information that is distributed, accessed, created, stored, or maintained by a Covered Entity requires...

The HIPAA Privacy Rule

The HIPAA Privacy Rule

The HIPAA Privacy Rule was established in 1996 to protect persons’ healthcare-related records and data, by law, the HIPAA Privacy Rule applies only to Covered Entities. The Rule demands that individuals’ healthcare-related information must be protected and in no case...