What is HIPAA Compliance?

Confused about HIPAA and HIPAA compliance? This article will explain HIPAA and the importance of complying with this complex federal law. What is HIPAA? HIPAA is the Health Insurance Portability and Accountability Act of 1996, which was signed into law by President Bill Clinton. The HITECH Act, which was signed by President Obama in 2009,… Read More

Human Hacking, Not Automated Attacks, Top Cyber Threat

Human hacking, also known as social engineering, has surpassed hardware and software vulnerabilities and is now the top cybersecurity threat, Computer Weekly reports: [A]ttackers shifted away from automated exploits in 2015. Instead, attackers engaged people through email, social media and mobile apps to do the dirty work of infecting systems, stealing credentials and transferring funds.… Read More

Hooray for Hollywood! – Hackers Hold Healthcare Hostage

Hackers Hold Hollywood Healthcare Hostage Hollywood Presbyterian Medical Center paid a $17,000 ransom in bitcoin to hackers who seized control of the hospital’s computer systems holding them a healthcare hostage. The cyber assault on Hollywood Presbyterian occurred Feb. 5, 2016, when hackers using malware infected the institution’s computers, preventing hospital staff from being able to… Read More

Hooray for Hollywood! – Hackers Hold Healthcare Hostage

Hackers Hold Hollywood Healthcare Hostage Hollywood Presbyterian Medical Center paid a $17,000 ransom in bitcoin to hackers who seized control of the hospital’s computer systems holding them a healthcare hostage. The cyber assault on Hollywood Presbyterian occurred Feb. 5, 2016, when hackers using malware infected the institution’s computers, preventing hospital staff from being able to… Read More

Cyber Forensics Protect the Innocent

Cyber Forensics Protect the Innocent It is always rewarding when cybersecurity and cyber forensics protect the innocent.  Monique Vivien Macias of KPNX 12 News Phoenix discusses with Lazarus Alliance and Continuum GRC’s CEO Michael Peters how cyber forensics has become such a vital resource in law enforcement’s toolkit. Christopher Thomas McKenna, the former Chaparral High School teacher… Read More

Defeating Cyber Security Deficits with a 1-2 Punch

Defeating Cyber Security Deficits with a 1-2 Punch Steve Morgan, a professional acquaintance who writes about cybersecurity for Forbes, published One Million Cybersecurity Job Openings In 2016 and revealed some jaw-dropping statistics concerning the growing deficit in hiring qualified cybersecurity employees. To make matters worse, this chasm is exacerbated by the explosion of corporate breaches… Read More

CIO, CISO, Eee Eye, Eee Eye Oh Crap a Data Breach!

How do you quantify the true cost of a data breach? How do you measure the costs against the benefits of eliminating risks, mitigating risks, or accepting risks to your business effectively? The Lazarus Alliance executive leadership team has been the proverbial tip of the spear within the proactive cybersecurity realm, well before there were… Read More

New PoSeidon Adventure is a POS Malware Threat to Retailers

The stunning reality is that the majority of retailers accepting credit cards are still vulnerable to the newest threat to accepting credit cards from consumers. Lazarus Alliance has been years ahead with proactive cybersecurity services. Researchers from the Cisco Security Solutions team have dubbed the latest malware to attack point-of-sales (POS) systems PoSeidon. Compromised POS… Read More

The Security Trifecta™: an introduction.

I was reading a news article this morning about another security debacle at NASA involving the theft of a laptop containing the command and control codes for some high-tech toys like the International Space Station. The thing that amazed me the most was not that NASA would be a high value target, but that this… Read More

Is Anyone Exempt From Cyber Crime Anymore?

With a show of those virtual hands, who has been notified by their credit card company about their personal information being exposed to cyber-crime? Now, with a show of those virtual hands; who has never been notified? If you think the problem is that cyber criminals are too good; you are mistaken. The problem is… Read More