PCI DSS Cloud Compliance: Your Guide to a Smooth Cloud Migration
| |

PCI DSS Cloud Compliance: Your Guide to a Smooth Cloud Migration

As cloud storage becomes the mainstream option for most businesses, industries like banking may feel hesitant to migrate due to compliance and security concerns. While there are certain security risks that comes with using cloud services, financial institutions have the upper hand. Compliance standards like Gramm-Leach-Bliley Act (GLBA) also known as the Financial Modernization Act of 1999 and PCI DSS continually…

HIPAA

What All Healthcare Companies Need to Know About HIPAA Compliance

Safeguarding protected health information is becoming more challenging every day, especially for companies operating in healthcare verticals who do not always understand that compliance issues apply to them. Yet, under the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule, companies operating in a variety of healthcare verticals are categorized collectively as “Business Associates”…

Why the Cloud is Safer than CIOs Believe: 6 Best Practices for Data Security

Why the Cloud is Safer than CIOs Believe: 6 Best Practices for Data Security

Chief Information Officers (CIOs) and executive leadership know how important cloud computing technology is, but still hesitate to transition. When a company is faced with any changes, reluctancy is natural. Having the whole IT leadership team on board can oftentimes seem like a difficult task to accomplish. Thankfully, cloud is almost always safer than CIOs…

Lightedge Appoints New VP & Technical Fellow

Lightedge Appoints New VP & Technical Fellow

Compliant Cloud and Colocation Company Strengthens Market Strategy DES MOINES, IA – April 16, 2019 – Lightedge announced today that Nate Olson-Daniel has been promoted to the role of Lightedge VP & Technical Fellow to further its commitment to delivering direct client access to Lightedge’s broad technical knowledge and experience. Nate has been on the engineering…

Network security
|

Network Security Is the Cornerstone in your Security Infrastructure

We are in a time where businesses are more digitally versed than ever before, and as technology becomes more advanced, so does network security vulnerabilities. Without a sophisticated security posture, enterprises are likely to face costly data breaches resulting in reputational damages. Unfortunately, small and medium-sized businesses are the most targeted group due to inadequate…

BYOD
|

Control the Risks of IoT and BYOD in Healthcare: Part II

This is the second in a two-part series on issues related to the IoT, BYOD and cybercriminal attacks on ePHI. We suggest starting with part I if you have not read it. The internet of things (IoT) includes personal mobile devices and wearables that employees and contractors use daily, inside and outside of the workplace….

IoT
|

Control the Risks of IoT and BYOD in Healthcare: Part I

Organizations that work with electronic protected health information (ePHI) must carefully weigh the risks and benefits of adopting new technology. From the internet of things (IoT) in hospitals, to wearable medical devices, to bring your own device (BYOD) policies, each endpoint represents a potential network vulnerability. Avoiding the adoption of new technology is not the…

IBM i
|

IBM i Power: Digital Transformation to Power Cloud

Digital transformation is critical for businesses to stay afloat these days, and the IBM i community is turning to cloud services for help. The growth we’ve seen in the last two to three years here at Lightedge has been in the countless inquiries for IBM i or AIX cloud hosting from organizations spanning all industry…