Absolute Press Room

  • How Greenville Health Systems Improved Endpoint Security and Achieved HIPAA Compliance
    On average, data breaches cost healthcare organizations $408 per record according to the 2018 Cost of a Data Breach Report by the Ponemon Institute and commissioned by IBM. Across all industries, healthcare has seen the priciest of data breaches for the last 8 years running. To boost security,...
  • NIST Cybersecurity Framework: Second, Build a Moat – Part 2
    The NIST Cybersecurity Framework is a repeatable framework organizations may follow to bolster their security posture. Within it, there are 5 foundational actions that may be flexibly deployed, regardless of industry or setting. In this, the second of a two-part post, we focus on the second...
  • NIST Cybersecurity Framework: Second, Build a Moat
    My last post guided you through the first pillar of the NIST Cybersecurity Framework (CSF): Identify. Here, we’ll talk through the steps to fulfill the second pillar of NIST CSF: Protect. But first, let’s consider a small, subtle nuance in our language. “Safe” is an adjective, not a verb. Although...
  • 5 Tips for Compliance Officers Dealing with GDPR
    GDPR enforcement is here and businesses are taking various approaches to comply. Most noticeable was the flood of emails we all received from companies scrambling to update their privacy policies. Big tech companies are passing the buck onto individual businesses and publishers, making them...
  • NIST Cybersecurity Framework: First, See Everything
    A long time ago in an organization far, far away… we had straightforward cybersecurity. There were relatively few assets, they were static and they accessed data through firewalls to prevent unauthorized access to a consolidated, authoritative data source: the network. Oh, and ‘apps’ weren’t a...