Aurora Blog
Multi Factor Authentication
Multi Factor Authentication is here and has been a part of our everyday life for a few years now. Everyday examples include: Your ATM Card
AB 1149 Aurora Releases “Compliance Data Security” White Paper
Aurora has just released a new white paper documenting the Best Practices for Data Security in regard to AB 1149 Compliance. AB 1149 is a
AB 1149 Demands IT Security Compliance for Local and County Government
Data Security strategy has often been the result of government mandated compliance requirements. With regulations governing the use of payment cards ( PCI ) to
TrueCrypt Alternative for Small Businesses
There is a lot of recent buzz around TrueCrypt Alternatives and speculations on why the developers of the
Aurora Releases ITAR Compliance Best Practices White Paper for Data Security
Aurora has released a comprehensive white paper on ITAR Compliance Best Pratices for Data Security. As ITAR Compliance becomes further intertwined with the IT world,
Data Security Best Practices for ITAR Compliance
What can organizations do to protect data with regards to ITAR compliance? We listed a short, summarized list below that can help organizations with ITAR
An Overview of ITAR Compliance in the IT World
International Traffic in Arms Regulations (ITAR) is a set of US Government regulations that deals with the export and temporary import of defense articles and
The Importance of Data Classification
Data is truly not created equal. We’re all concerned about Data theft, be it credit card information, healthcare (PHI) information, or private and confidential employee
Next Generation Firewall
I never thought I’d be jazzed about the topic of Next Generation Firewall but I just sat through a demonstration by McAfee on their Next
Security Awareness Training Reduces Hacker Exposure
According to The Verizon Data Breach Investigations Report which analyzed data from 1,367 breaches and 63,437 security incidents in 2013, the majority of the breaches
The Path to HIPAA Compliance
The path to HIPAA compliance has many variables, and includes several different assessments, but fortunately there are services available to assess your business with
Understanding the Need for Data Loss Prevention ( DLP )
Understanding the Need for Data Loss Prevention ( DLP ) The inherent need for DLP can be easily understood when viewed in terms of Traditional
Local Admin Privileges Can Pose HIPAA Challenges
Several businesses have a policy to give a subset of users local admin rights on their laptops or desktops. In some cases, this might be
Aurora Releases a New Encryption Case Study
Aurora recently undertook an Encryption deployment with TiVo, a DVR manufacturer recognized by many. The project dealt primarily with the protection of sensitive data through
The Benefits of Hosted Disk Encryption (Video)
In this video, Ralph Figueiredo of Aurora takes you through the key processes of Hosted Disk Encryption which your business or company can reap
HIPAA Compliance, Deadlines and Due Diligence
If you’re reading this blog, chances are you’re at least slightly aware of the new HIPAA Omnibus rule changes as of 2013. The deadline for compliance