In this townhall session, Mike Mason of FairWarning, along with Brian Olearczyk and Pete Thurston of RevCult, discuss how to monitor for anomalous events and document both current state and modified states of any changes to facilitate error-free recovery.
They also discuss:
With rapid changes to HIPAA enforcement throughout the COVID-19 crisis, keeping up has been an ongoing chal...
Have Questions About Salesforce Data Security?Get Answers
This whitepaper explores a number of remote work scenarios that are cause for concern in Salesforce. Read on to learn the red flags and how to mitigate threats to your sensitive Salesforce data.
With rapid changes to HIPAA enforcement throughout the COVID-19 crisis, keeping up has been an ongoing challenge for healthcare providers. Understanding the aspects of HIPAA that have changed and...
This townhall Q&A provides InfoSec & Compliance professionals with timely advice and best practices for securely enabling an expanding, remote workforce who is working with sensitive Salesforce data.
As the impact of COVID-19 grows, protecting patient privacy is paramount for healthcare organizations hard at work treating those affected by the pandemic. Although many organizations are...
Discover how you can monitor for COVID-19-related activity to protect patients from privacy and security violations and meet strict compliance requirements.
If you’re switching to a remote work environment, you’ll need to know about securing a remote workforce for maximum data security.
Data security should prevent external attacks and insider threats because privileged user abuse is a top concern in the cloud. Find out more about preventing insider abuse in this article.
Privileged user abuse may be malicious, or it may be unintentional. Either way, it represents a huge liability to your company. The two main areas of concern with privileged user abuse in...
Your healthcare privacy program can be complicated. It may contain thousands of users, multiple admins, community portals, customized data structure – the list goes on. And to prevent data...
By using privileged user activity monitoring, you can prevent insider threats like privileged user abuse in Salesforce.
Dive into the Cloud Visibility Report to discover what top organizations are monitoring in their cloud applications like Salesforce, Office 365, Dropbox, and more.
Are insider threats lurking in your financial organization? You might be surprised. This webinar will show you how to identify and mitigate risks in Salesforce and beyond.
Every financial organization needs to defend itself from a major security concern – insider threats. From the malicious worker to the careless employee, these are the insiders you need to thwart.
Every healthcare organization needs to defend itself from a major security concern – insider threats. From the malicious worker to the careless employee, these are the insiders you need to thwart.
Would you recognize these 5 familiar faces of the insider threat? You might be surprised. Test your insider threat awareness with this post!
Discover best practices for mitigating internal risks in your organization, red flags to watch out for, top solutions for eliminating security vulnerabilities, and more in this e-book.
Cybersecurity experts Jeffrey DiMuro, Salesforce’s Chief Security and Compliance Architect for Financial Service Industry Team, and Josh Hofer, Stearns Bank’s Chief Risk and Information Security...
Salesforce data protection and security are critical for cloud apps. Protect information from insider threats with FairWarning Cloud Security.
Technological innovation continues to expand every day in healthcare. New and emerging technologies solve industry challenges, create improvements in patient access, help protect patient data, and...