In this townhall session, Mike Mason of FairWarning, along with Brian Olearczyk and Pete Thurston of RevCult, discuss how to monitor for anomalous events and document both current state and modified states of any changes to facilitate error-free recovery.
They also discuss:
With rapid changes to HIPAA enforcement throughout the COVID-19 crisis, keeping up has been an ongoing chal...
Have Questions About Salesforce Data Security?Get Answers
A defense in depth approach to security is vital for establishing trust, maintaining compliance, and securing sensitive data. Learn how to secure your organization from the inside out in this e-book.
Discover the latest cloud security news, including new zero trust architecture guidelines, CISO priorities, the cost of cybercrime, and more.
COVID-19 has significantly impacted healthcare. In this article, discover how COVID-19 impacts drug diversion in healthcare organizations.
Policymakers in the United States have introduced three privacy acts to regulate contact tracing solutions that track the spread of the coronavirus, fueling the nationwide debate over data privacy...
This whitepaper explores a number of remote work scenarios that are cause for concern in Salesforce. Read on to learn the red flags and how to mitigate threats to your sensitive Salesforce data.
With rapid changes to HIPAA enforcement throughout the COVID-19 crisis, keeping up has been an ongoing challenge for healthcare providers. Understanding the aspects of HIPAA that have changed and...
This townhall Q&A provides InfoSec & Compliance professionals with timely advice and best practices for securely enabling an expanding, remote workforce who is working with sensitive Salesforce data.
As the impact of COVID-19 grows, protecting patient privacy is paramount for healthcare organizations hard at work treating those affected by the pandemic. Although many organizations are...
Discover how you can monitor for COVID-19-related activity to protect patients from privacy and security violations and meet strict compliance requirements.
If you’re switching to a remote work environment, you’ll need to know about securing a remote workforce for maximum data security.
Data security should prevent external attacks and insider threats because privileged user abuse is a top concern in the cloud. Find out more about preventing insider abuse in this article.
Privileged user abuse may be malicious, or it may be unintentional. Either way, it represents a huge liability to your company. Identify potential privilege misuse and with the tips in this post.
Your healthcare privacy program can be complicated. It may contain thousands of users, multiple admins, community portals, customized data structure – the list goes on. And to prevent data...
By using privileged user activity monitoring, you can prevent insider threats like privileged user abuse in Salesforce.
Dive into the Cloud Visibility Report to discover what top organizations are monitoring in their cloud applications like Salesforce, Office 365, Dropbox, and more.
Are insider threats lurking in your financial organization? You might be surprised. This webinar will show you how to identify and mitigate risks in Salesforce and beyond.
Every financial organization needs to defend itself from a major security concern – insider threats. From the malicious worker to the careless employee, these are the insiders you need to thwart.
Every healthcare organization needs to defend itself from a major security concern – insider threats. From the malicious worker to the careless employee, these are the insiders you need to thwart.
Would you recognize these 5 familiar faces of the insider threat? You might be surprised. Test your insider threat awareness with this post!