veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

47
active users

#MSSP

0 posts0 participants0 posts today
nearshorecyber<p>How long should it take to take an MDR provider global? </p><p>30 days? <br>60 days?<br>6 months?<br>𝗔 𝘄𝗲𝗲𝗸? </p><p>How much should it cost to find, evaluate, and start a follow-the-sun SOC?</p><p><a href="https://mastodon.social/tags/Mexico" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mexico</span></a> <a href="https://mastodon.social/tags/Philippines" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Philippines</span></a> <a href="https://mastodon.social/tags/Greece" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Greece</span></a> <a href="https://mastodon.social/tags/SecOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecOps</span></a> <a href="https://mastodon.social/tags/MDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MDR</span></a> <a href="https://mastodon.social/tags/MSSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSSP</span></a></p>
LimaCharlie<p>Is your MSSP struggling to grow while your EDR vendor targets your customers with their MDR services?</p><p>Join Maxime Lamothe-Brassard TODAY at 10:00AM PST / 1:00PM EST to discover how to respond faster, scale efficiently, and increase profitability with practical solutions for:</p><p>&gt; Deploying in minutes during emergency incidents<br>&gt; Maintaining consistent security with Git integration<br>&gt; Unifying visibility across multiple data sources<br>&gt; Creating new revenue streams without retraining staff</p><p>Register now: <a href="https://limacharlie.wistia.com/live/events/dg797y08lv?utm_campaign=Outreach&amp;utm_source=Mastodon&amp;utm_medium=Social" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">limacharlie.wistia.com/live/ev</span><span class="invisible">ents/dg797y08lv?utm_campaign=Outreach&amp;utm_source=Mastodon&amp;utm_medium=Social</span></a></p><p><a href="https://infosec.exchange/tags/mssp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mssp</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
secsolution<p>La cyber resilienza secondo la normativa DORA: di Denis Valter Cassinerio - Senior Director &amp; General Manager South EMEA Acronis La resilienza informatica continua a essere al centro dell'attenzione nel settore della cybersecurity. L'obiettivo della migliore implementazione all'interno delle aziende e' infatti una parte centrale anche della normativa...<br><a href="https://mastodon.social/tags/DenisValterCassinerio" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DenisValterCassinerio</span></a> <a href="https://mastodon.social/tags/EMEA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EMEA</span></a> <a href="https://mastodon.social/tags/Acronis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Acronis</span></a> <a href="https://mastodon.social/tags/regolamentoDORA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>regolamentoDORA</span></a> <a href="https://mastodon.social/tags/MSSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSSP</span></a> <a href="http://dlvr.it/TJlysd" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">dlvr.it/TJlysd</span><span class="invisible"></span></a></p>
Patrick Townsend<p>Heads up, InfoSec friends in the US - HIPAA<br>&nbsp;</p><p>It is hard to believe that the HIPAA rule was passed almost 30 years ago. And, to me, it is surprising that the folks at HHS/OCR are just now getting around to correcting one fundamental mistake in the security rules. If you follow this regulatory area, you know that some of the security rules are mandatory and some of them are “addressable”. What does addressable mean? It means you *should* do it, but you don’t have to. In the security world we know what that means. If you don’t have to do it, you probably won’t. And that’s exactly what happened – health care data breaches have just increased over time. Recently we saw the massive Change Healthcare breach with about 100 million (!) records lost.<br>&nbsp;<br>HHS/OCR is now planning on an update to HIPAA security rules related to encryption and some other areas. This Notice of Proposed Rulemaking (NPRM) just arrived in my inbox this week:<br>&nbsp;<br><a href="https://www.hhs.gov/hipaa/for-professionals/security/hipaa-security-rule-nprm/factsheet/index.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">hhs.gov/hipaa/for-professional</span><span class="invisible">s/security/hipaa-security-rule-nprm/factsheet/index.html</span></a><br>&nbsp;<br>It takes time for this to work through the bureaucratic process, but given the history of losses of Protected Health Information (PHI and ePHI), I think this will eventually become the rule. Notice that the distinction between “mandatory” and “addressable” is going away. Also notice the focus on encryption of data at rest.<br>&nbsp;<br>Most health organizations (Covered Entities and Business Associates in HIPAA lingo) have done work to encrypt laptops but that is not where the juicy stuff resides. It’s in those big medical application databases. So, this will be a big change.<br>&nbsp;<br>If you provide IT and/or security expertise to an organization covered by HIPAA, I suggest the following initial steps:<br>&nbsp;<br>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Map the healthcare data flows. You will need this to implement an encryption strategy, and it will be required under the proposed rules.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Start talking to your software vendors. Companies like Epic and Cerner (from Oracle) will address this through software updates and you will need to know their proposed schedules. In my experience it is the smaller software vendors who will need prodding. Make a list and give them a call.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Assess the impact on your hardware environment. Encryption may require upgrades to handle increased demand on CPUs.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Encryption key management with a proper KMS is probably the biggest challenge to an encryption strategy. Understand best practices in this area and be sure your vendors line up. Getting this right at the beginning will save a lot of headaches later.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Start talking to management right now. This will be a significant change and they should get prepared.<br>&nbsp;<br>&nbsp;Yes, I know – encryption is not a perfect solution. No security solution that we deploy is perfect. But it can substantially reduce the loss of unprotected healthcare data.<br>&nbsp;<br>I will try to post more about this as the proposed rule-making proceeds.<br>&nbsp;<br><a href="https://infosec.exchange/tags/HIPAA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HIPAA</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://infosec.exchange/tags/MSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSP</span></a> <a href="https://infosec.exchange/tags/MSSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSSP</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@hacks4pancakes" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>hacks4pancakes</span></a></span> am I the only one who thinks <a href="https://infosec.space/tags/MSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSP</span></a>|s and <a href="https://infosec.space/tags/MSSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSSP</span></a>|s are <a href="https://infosec.space/tags/valueRemoving" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>valueRemoving</span></a> <a href="https://infosec.space/tags/DigitalSnakeoil" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalSnakeoil</span></a> dealers that do <a href="https://infosec.space/tags/RentSeeking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RentSeeking</span></a> all the time?</p>