fbpx
      Posts Tagged :

      Aurora

      Cyber Insurance – Why Insuring Your IT Infrastructure is a Must

      Target…Neiman Marcus….Home Depot….and now Chase, Cyber Breaches are now a mainstay of Corporate America and will be for a long time to come. Although the first few IT Security breaches had caused uproar in the media and panic within the general public, it seems that as of now, these breaches are commonplace and even expected…

      read more

      EAR Compliance and Data Classification Pt. II; Categorization

      Equally important as classifying EAR Sensitive data, is categorizing it. Once data is deemed as sensitive or non-sensitive, an organization must apply a set of categories that will differentiate data based on confidentiality and authorization. While it’s understood that an inherent rule of EAR compliance demands that EAR Sensitive data not be seen by non-US…

      read more

      TrueCrypt Alternative for Small Businesses

      There is a lot of recent buzz around TrueCrypt Alternatives and speculations on why the developers of the encryption freeware took their site down, etc. All hype aside, TrueCrypt will return as a viable option for individuals to send encrypted files to one another and to encrypt volumes…

      read more

      Aurora Releases ITAR Compliance Best Practices White Paper for Data Security

      Aurora has released a comprehensive white paper on ITAR Compliance Best Pratices for Data Security. As ITAR Compliance becomes further intertwined with the IT world, it is important to understand how to keep your organization protected and compliant with ITAR guidelines to avoid costly breaches and penalties. Stay in the know with Aurora’s ITAR Compliance…

      read more

      Data Security Best Practices for ITAR Compliance

      What can organizations do to protect data with regards to ITAR compliance? We listed a short, summarized list below that can help organizations with ITAR compliance through some data security best-practices. It is important to understand that data security is not an end result, but a continuous journey in protecting your information assets. We implement…

      read more

      The Path to HIPAA Compliance

      The path to HIPAA compliance has many variables, and includes several different assessments, but fortunately there are services available to assess your business with respect to HIPAA standards. Risk Assessment: A useful tool which has helped point numerous organizations in the right direction for compliance is a “HIPAA Risk Assessment”. Risk Assessments are…

      read more
      Aurora has joined the Plurilock FamilyLearn More
      +