5 Big Data Minds You Should Follow on Twitter


We’ve reached the point in big data’s innovation cycle where many of the barriers have been broken down and we are seeing some mind-blowing results—solutions that actually work and make businesses, and lives, substantially better. These brilliant minds are in the trenches, building self-repairing nano-circuits and tackling diseases. So, here’s my pick of 5 big data […]

Continue Reading →

TechFails – IOSS 15


When technology doesn’t work when it should, is it a tech fail? Or perhaps because humans are creating the technology, fails should be more accurately called a human fail? In this episode, we discuss various types of “fails”, including the latest popular Pokémon Go, why we can’t vote online and the biggest fail of all, […]

Continue Reading →

Hospitals (and Other Covered Entities) Will Be Randomly Selected for HIPAA Audits in 2016


With July coming to an end and the year more than half over, it’s a good time to look at where we stand breach-wise. Your intuition may be telling you that 2016 has been a bad year with hacking attacks reported daily. You intuition is right. The Identity Theft Resource Center is my go-to resource […]

Continue Reading →

Resources for a Junior Sysadmin Straight Out of College


To prepare for your first job as a Junior Sysadmin, we have a few tips that will make you stand out: Read The Sysadmin Guide A detailed, plain-English guide to dealing with the aspects of being a Sysadmin that aren’t covered in a manual. Before Graduation… Take advantage of these free tools for students: Microsoft […]

Continue Reading →

21 Free Tools Every SysAdmin Should Know


Knowing the right tool to the right job is something that can save you hours of extra work and tedium. We’ve compiled a list of of some of the best general purpose sysadmin tools for troubleshooting, testing, communicating and fixing the systems that you need to keep running. WireShark http://www.wireshark.org/ Wireshark is the world’s foremost […]

Continue Reading →

Understanding Canada: Ontario’s New Medical Breach Notification Provision (and Other Canadian Data Privacy Facts)


Remember Canada’s profusion of data privacy laws? The Personal Information Protection and Electronic Documents Act (PIPEDA) is the law that covers all commercial organizations across Canada. Canadian federal government agencies, though, are under a different law known as the Privacy Act. But then there are overriding laws at the provincial level. If a Canadian province […]

Continue Reading →

Email security in the wake of #DNCLeaks


Back in December, our #1 prediction for 2016 was that the U.S. Presidential campaign would be impacted by a cyber attack. And here we are. Watching the fallout from #DNCLeaks it’s evident just how devastating email breaches can be. For many organizations email is the most sensitive asset they have, yet monitoring for anomalous access […]

Continue Reading →

Banks Secretly and Silently Struggling with Ransomware


“You’re almost certainly not going to hear about successful ransomware attacks on banks,” says Fraud Prevention Expert, Ross Hogan in an interview with Banking Exchange. “It is probably one of the most catastrophic events that a bank could suffer.” Why? If a financial institution made a public announcement that the firm was infected with ransomware, the […]

Continue Reading →

How to Identify Ransomware: Use Our New Identification Tool


Sadly, ransomware infections are routine enough that IT departments have started to develop standardized procedures for rapidly quarantining infected machines, determining the extent of damage and then attempting recovery operations.. For help with locking off computers performing suspicious actions (like modifying thousands of files in a minute), our DatAlert customers are using custom rules and scripts […]

Continue Reading →

How to Respond to a Cyber Security Incident


Every day another company is caught off guard by a data breach. While avoiding an attack is ideal, it’s not always possible. There’s no such thing as perfect security. Even if you’ve outsourced your IT or your data lives in the cloud, ultimately the responsibility for keeping your customer data safe falls on your shoulders. […]

Continue Reading →

Is Browsing Facebook While in the Hospital a HIPAA Violation?


A recently filed federal class-action suit claims that several healthcare providers are violating HIPAA’s rules on protected health information (PHI). If the suit succeeds, privacy advocates say it has the potential to disrupt the way the ad targeting industry deals with the healthcare sector. To really understand what’s going on, you’ll need some background on HIPAA. […]

Continue Reading →