Compliance Mistakes: 5 Killer Errors

Compliance Mistakes

Compliance mistakes can be costly. Very costly. The fines associated with non-compliance and/or data breaches are stiff and punishing in multiple ways. Sarah Morris of KirkpatrickPrice, our auditor, kindly put together this list of five key compliance mistakes. At AISN, we urge you to be proactive about compliance and security and understand how to avoid … Read more

Talking Points: Moving Legacy Applications to the Cloud

Are you thinking of moving legacy applications to the cloud? Earlier this month, I posted a blog about why organizations should move legacy applications to the cloud, specifically one of our High Security Clouds built on the Microsoft Cloud Platform. I wanted to add some talking points to the previous entry for those IT folks … Read more

Move Legacy Apps to the Cloud

Frequently, we’re asked, “We need to move legacy apps to the cloud. How can I make the case to management?” The changing trends in business are creating significant burdens on IT, and those who do not embrace this change may lose their competitive edge.  When our customers need to move legacy apps to the cloud, … Read more

CFPB Vendor Compliance Management

When it comes to CFPB vendor compliance, companies must “oversee” their vendors “in a manner that ensures compliance with Federal consumer financial law…The CFPB’s exercise of its supervisory and enforcement authority will closely reflect this orientation and emphasis,” according to the Consumer Financial Protection Bureau’s CFPB Bulletin 2012-3. An effective risk management strategy includes the … Read more

Security Best Practices for Social Media Users

Security Best Practices for Social Media Users

Users of popular social media sites may not realize the potential risks to which they expose themselves while using and participating in social networking. Most users develop a “dangerous level of assumed trust” with other users of these sites, regardless of whether or not they have actually verified their identities. This is why it is a good … Read more

Hospital Network Security: 3 Key Principles Illustrated

Today, I’d like to talk a little about hospital network security and point to a story about a hospital incident in which three key principles of hospital network security are illustrated. As you may know, technical controls are sometimes illustrated with physical descriptions in order to help the non-technical person understand the concept. A firewall, … Read more

Microsoft Cloud Platform Powered by AIS Network

The Microsoft Cloud Platform Delivers! The Microsoft Cloud Platform delivers, and AISN is excited to roll it out early in 2015. And, although we’ve built an entire suite of High Security Cloud Services on the Microsoft Cloud Platform, when it comes to our High Security Private Cloud, we love that the Microsoft Cloud Platform powered by AISN … Read more

Six Tips to Secure Healthcare Data, Ensure HIPAA Compliance

It’s one thing to suffer one data breach – there is room to recover. Will Anthem survive a second breach? Don’t let this happen to you. With the Anthem breach still on the forefront of everyone’s minds, as well as the upcoming supervision from the OCR and the new phase of HIPAA audits, we have put … Read more

PCI DSS: 15 Common PCI Compliance Gaps

15 Common PCI Compliance Gaps

Common PCI compliance gaps?  You bet!  We can identify 15 of them. The need for enhanced security is becoming more and more obvious every day. As the security landscape changes, the threats to our sensitive data become more serious, and as a result, the controls that we put in place have become stronger. We see a … Read more

Avoid Becoming the Next Anthem Breach: 3 Tips

The recent Anthem breach is potentially the largest data breach to date in the healthcare space. When your CEO or your largest clients ask you what your plan is to prevent the same from happening to you, what are you going to tell them? Safeguarding Personally Identifiable Information (PII) is essential for avoiding a data … Read more