References

  1. Aurnou S. Secure Your Wi-Fi Router (it’s What Connects You to the Internet). The Security Advocate. 2013 Apr. Accessed November 16, 2015.
  2. Korolov M. Key management is the biggest pain of encryption. CSO Online. 2015 Apr. Accessed November 16, 2015.
  3. Lawton S. How To Select The Right Encryption Key Management Solution. Tom’s IT Pro. 2015 Jan. Accessed November 16, 2015.
  4. Verizon. 2015 Data Breach Investigations Report. Accessed November 16, 2015.
  5. Aurnou S. Advanced Persistent Threats: What Are They & How Do They Work? The Security Advocate. 2013 Oct. Accessed November 16, 2015.
  6. FBI Internet Crime Complaint Center. Business E-mail Compromise. 2015 Jan. Accessed November 16, 2015.
  7. FBI Internet Crime Complaint Center, Business Email Compromise [Update]. 2015 Aug. Accessed November 16, 2015.
  8. Gutierrez S. Text-message scam targets bank accounts. SeattlePI. 2011 Oct. Accessed November 16, 2015.
  9. Krebs B. Online Thieves Take $205,000 Bite Out of Missouri Dental Practice. Krebs on Security. 2010 Mar. Accessed November 16, 2015.
  10. Kashyap R. Why Malvertising Is Cybercriminals’ Latest Sweet Spot. Wired. 2014 Nov. Accessed November 16, 2015.
  11. Electronic Frontier Foundation. HTTPS Everywhere. Accessed November 16, 2015.
  12. Stanescu B. The Ultimate Guide to Secure Your Social Media Account. Hot for Security. 2013 Aug. Accessed November 16, 2015.
  13. Verizon. 2014 Data Breach Investigations Report. Accessed November 16, 2015.
  14. Rubenking NJ. The Best Password Managers for 2015. PCMag. Accessed November 16, 2015.
  15. Rubenking NJ. The Best Free Password Managers for 2015. PCMag. Accessed November 16, 2015.
  16. Holtzman D, McMillan E. HIPAA Changes Mean Tightening Up Vendor Relationships. The Privacy Advisor. 2014 Feb. Accessed November 16, 2015.
  17. Jackson Higgins K. Hospital Medical Devices Used As Weapons In Cyberattacks. Dark Reading. 2015 June. Accessed November 16, 2015.
  18. Zetter K. It’s Insanely Easy to Hack Hospital Equipment. Wired. 2014 Apr. Accessed November 16, 2015.
  19. HHS Office of Civil Rights. Breaches Affecting 500 or More Individuals. Accessed November 16, 2015.
  20. HHS. Incident Reporting, Policy and Incident Management Reference. Accessed November 16, 2015.
  21. National Institute of Standards and Technology. Computer Security Incident Handling Guide. SP 800-61 rev. 2. 2012 Aug. Accessed November 16, 2015.
  22. Okolita K. How to Perform a Disaster Recovery Business Impact Analysis. CSO Online. 2009 Dec. Accessed November 16, 2015.
  23. Lindros K, Tittel E. How to Create an Effective Business Continuity Plan. CIO. 2013 Nov. Accessed November 16, 2015.
  24. Kirvan P. How to write a disaster recovery plan and define disaster recovery strategies. ComputerWeekly. 2011 July. Accessed November 16, 2015.
  25. Ragan S. Hard-coded credentials placing dental offices at risk. CSO Online. 2015 May. Accessed November 16, 2015.

Additional Resources

  • No Additional Resources Available