Tuesday, August 18, 2015

Data Leakage

Attackers generally are looking to disrupt your business and/or breach your system to steal the protected health information (PHI) and personal identifiable information (PII). This may be done via a DDoS or other methods to stop persons from visiting your website. Breaching your system may take a more advanced route, however still creates a massive issue.

The persons attempting to compromise the system are looking for weak points in your information/cyber security posture. This includes, depending on the circumstances, your employees, updates to the computer system, points where the information is being transferred, wireless access, and other points of interest to them. Data can be transferred via Wi-Fi, email, thumb drives and other avenues. Each of these represent a point of potential weakness that could be breached. These and other areas should be tested to ensure compliance with HIPAA, HITECH, PCI, GLBA, or other relevant to your industry regulation.

Call us for additional information and personalized quote.



Miel, LLC Infosec Consulting

Penetration Testing and Vulnerability Assessment

810-701-5511


 
www.mielinfosec.blogspot.com


It is not about winning or losing, but reorienting yourself to the real problem-managing the risk across the enterprise.

No comments:

Post a Comment