Healthcare Data Breach Prevention: Take Back Control

In 2020, the U.S. Department of Health and Human Services Office for Civil Rights (OCR) revealed that healthcare data breach incidents had climbed up to a reported 1.76 per day, marking a 25% increase over reported incidents from the previous year (HIPAA Journal). An “incident” defines a breach that affects 500 records or more. In … Continued

Healthcare Cybersecurity: 8 Data Protection Best Practices

Healthcare organizations need to look beyond compliance to reduce risk, implement robust data management, and achieve a data protection program that balances safeguarding patient data with providing the highest quality of patient care. Healthcare Data Security Challenges Patient data — or protected health information (PHI) under HIPAA (the Health Insurance Portability and Accountability Act) — … Continued

17 Healthcare Data Trends to Watch in 2021

From the ever-rising cost of data breaches in healthcare to the meteoric adoption of telehealth due to Covid-19 to an influx of data from smart devices, here are some recent trends that organizations in healthcare need to know, follow, and prepare for. Double the Price: The Cost of Data Breaches in Healthcare The healthcare industry … Continued

Cybersecurity Stats to Know in 2021: 7-Point Guide

Modern security programs are critical to protect and manage data — unstructured and structured, in the cloud and on-prem — across the ever-evolving data landscape. Recent trends point to an increase in data breaches, data leaks, and compromised crown jewel data. Get the latest cybersecurity statistics on the cost of data breaches, security leaks, and … Continued

Risk and Regulation in Financial Services

In BigIDeas on the Go, Omkhar Arasaratnam, the Engineering Director of Cloud Security at Google, shares insights from his career in security and financial services, talks about the interplay between privacy and protection, and offers his thoughts on cloud migration in financial services. Bitten by the “Security Bug” Arasaratnam describes his career as “a tech … Continued

6 Ways to Secure Data for Mergers and Acquisitions

Companies that are merging with another legal entity, acquiring an organization, or divesting of a business face one of the most complex operational and technological transactions they will likely encounter in the corporate lifecycle. In This Article, Learn About: Due Diligence Challenges Integration Challenges How BigID Helps with Successful M&A Discover and catalog all your … Continued

How to Prevent Data Leaks in Amazon S3

The past several years have seen the migration of massive amounts of data to cloud platforms like Amazon Web Services (AWS). While many businesses have established and enforced measures to ensure that data stored in the cloud stays protected, cautionary tales about exposed data from Amazon S3 buckets tell a different story. AWS launched S3, … Continued

The Balance Between National Cybersecurity and Personal Privacy

In BigIDeas on the Go, Sam Visner, Director of the National Cybersecurity Federally Funded Research and Development Center (FFRDC) at MITRE, talks about innovative cybersecurity technologies that help businesses meet industry standards, the future of an interconnected data infrastructure, and the intersection of security and personal privacy. From the NSA to the private sector and … Continued

Economics of Security During COVID-19

In our BigIDeas on the Go podcast, BigID CEO Dimitri Sirota talks with Dan Geer, security and risk management expert and CISO at In-Q-Tel—the strategic investment arm of the US intelligence community. Geer examines the future of enterprise security, as well as data protection and privacy concerns in the context of Covid-19. Geer’s repertoire in … Continued

Find Similar and Duplicate Files and Databases with BigID’s Cluster Analysis

Using BigID’s patent-pending data fingerprinting, find similar data using fuzzy matching machine learning. Identify duplicate, redundant, and similar data. Categorize and automatically label using BigID. Reduce security and privacy risk with minimization. Rationalize infrastructure and cloud costs through data and system consolidation.

Monitor the Dark Web for Data That Resembles Yours

Find suspicious data on the dark web and compare automatically to your own enterprise data map for rapid-breach identification and investigation. Continuously monitor dark web or manually compare suspicious data. Uncover which internal data sources most closely resemble the suspicious data. Identify impacted users for rapid and targeted notifications.