BIS CEO Earns the Certified Information Systems Security Professional Designation (CISSP)

BUSINESS INFORMATION SOLUTIONS, INC. FOUNDER AND CEO PHILLIP LONG EARNS THE CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP) DESIGNATION

ROBERTSDALE, Alabama (DATE TBD) - Phillip Long, founder and CEO of BIS Technology Group and owner of Business Information Solutions, Inc.

Best Practices to Avoid Insider Threat

Best Practices to Avoid Insider Threat
All companies must use the best practices to avoid insider threat from taking place and know how to avoid situations involving accidental or a malicious rogue employee or contractor. According to Verizon’s 2015 Data Breach Investigations Report, 50% of all security events are caused by a company's own employees.

Insider Threats and IT Security: How to Identify and Prevent

The number of insider threats from employees causing IT security breaches has skyrocketed since 2007. Globally, over 4.2 billion records were compromised in 2016, and according to Verizon’s 2015 Data Breach Investigations Report, 50% of all security events were caused by employees from inside the organization where they work.

Security Awareness Training: Strengthen the Human Firewall

 

With the threat of a cyber attack literally just a click away, providing quality, comprehensive security awareness training to your employees is more important than ever. Your employees are your first line of defense to your network, and they can easily be your strongest asset to identifying threats or your weakest link.

The Case for Employee Monitoring and Usage Policies

Employee monitoring is becoming more and more popular as businesses look into ways they can have tighter security and a more productive workforce.
It's true that the employee workplace has come a long way in terms of labor rights and fair wages, equal opportunity, and what questions are appropriate to ask in interviews.

HIPAA Phase 2 Audits Begin – Is Your Practice Compliant?

As a part of the continued efforts to measure the compliance with HIPAA privacy, security, and breach notification rules, The Office for Civil Rights (OCR) has begun implementing the HIPAA Phase 2 audits, the next phase in auditing the policies and procedures adopted and used by healthcare entities and their business associates.