Category: <span>Industry</span>

Why Healthcare Fraud Is Increasing under COVID-19

The insurance industry has always been a hotspot for IT security threats since the information that can be used for insurance fraud is a hot commodity amongst hackers. Health insurance fraud alone accounts for a hefty $80 billion bill each year as estimated by the Federal Bureau of Investigations (FBI). In fact, who could forget
Read More

Thanks to all that attended “Enabling Digital Access for Patients and Providers – Securely & Simply”

We had the pleasure of sitting down for an in-depth executive roundtable this morning with over a dozen leading healthcare information and security executives. While the topics were wide-ranging, the consensus was that identity security is critical, particularly in the face of increased digital engagement with patients and between healthcare staff. We look forward to
Read More

Managing Non-Employee Identities in Healthcare

It’s not just malicious cyber-attacks or criminal activity that companies need to prepare for. The majority of data breaches originate within companies due to human error or negligence, and in many cases, this can be traced back to the lack of proper access controls. One of the biggest access challenges? Securely and efficiently managing non-employee
Read More

What fits in a data center cabinet?

It’s a basic question that I get at least weekly. When estimating cabinets (and PDU), there are physical considerations (space, weight, and design features) and power/cooling considerations. RU Space This is a physical space limitation. Rack Units (RU or just U) are 1.75” measures usually having 3 holes each for mounting equipment. For example, a
Read More

How to Find The Right Data Center Infrastructure Management (DCIM) Solution

Because Data Center Infrastructure Management (DCIM) touches all functional areas of the data center and affects all data center groups and silos, finding the “right” DCIM solution can be a daunting task, especially for companies with medium to large data centers. This means that someone within your organization, or a trusted advisor from the outside,
Read More

How To Do Application Mapping

You can build application mapping by a series of smaller tasks. Begin by determining the breadth of scope. Next, identify the applications. Then, gather the facts. And last, follow-up on the loose ends. This blog does not cover why one would do Application Mapping or, as DCMWORKS calls it, Application Finger Printing (AFP). That was
Read More