<img src="//bat.bing.com/action/0?ti=5739614&amp;Ver=2" height="0" width="0" style="display:none; visibility: hidden;">

Businessolver Blog

Your Company’s Biggest Cybersecurity Threat is Your Employees

Posted by Sean McMurray on Aug 29, 2017 10:00:00 AM

In the past few years, cyber hackers have become vastly more sophisticated, both at infiltrating systems and eluding detection; however, employee cybersecurity training hasn’t evolved to effectively prevent hackers’ increased savvy: While 84 percent of organizations experience staff-related security incidents, 60 percent of businesses admit their employees have no knowledge of security risks.

Read More

2 Million Reasons to Stay Vigilant with PHI – Plus 2 Ways to Do It

Posted by Ryan Keehn on Apr 27, 2017 10:00:00 AM

Wherever technology is involved, information security can’t be far behind. While we lean on technology to help streamline Annual Enrollment and benefits administration, and make the user experience more positive and personalized, we can’t ignore that technology also opens the door to personal data getting into the hands of the wrong people.

Read More

Technology or People: What’s Your Biggest Security Risk?

Posted by Natalie McLinden on Aug 31, 2016 9:48:45 AM

Security might not be a popular topic around the office, but it is an important one—especially if you’re in the benefits industry. By nature, the PHI that is handled—from Social Security numbers to medical information—makes HR and healthcare extremely attractive targets for cyber hackers. Handling this sensitive data means HR administrators need to ensure they’re making data security a priority within their organization. It’s HR’s job to protect your people – that includes protecting their most personal information.

Read More

Data Security: What You Think Is in the Cloud Is at the Bottom of the Sea

Posted by Businessolver on Nov 3, 2015 11:04:23 AM

Pop Quiz: What is looming right now, today, as the largest security threat to every piece of employee and HR data your company has stored in the cloud?

Read More

Here a Breach, There a Breach: How Safe Is Your Data?

Posted by Businessolver on Sep 29, 2015 10:13:00 AM

With all of the hand-wringing and media attention surrounding data breaches in the past year or two, you’d think that the number of breaches would be dropping dramatically. Unfortunately, that’s an erroneous assumption.

Read More

Security in the Cloud: It's All the Rage, but What Does it Mean?

Posted by Businessolver on Sep 2, 2015 9:12:54 AM

While listening to NPR (National Public Radio) recently, we couldn’t help but notice that of the brief descriptions of the program’s three corporate supporters, two referred to doing business in the cloud and to data security:

“Support for NPR comes from ... AT&T. With AT&T, the network is on demand, the office is mobile and the cloud is designed for high security. ... And Carbonite — providing secure and automatic backup and recovery for businesses and homes.”

Read More

When Hacking Actually Helps Protect Your Data

Posted by Natalie McLinden on Aug 14, 2015 10:58:00 AM

Last week we kicked off Security Awareness Month at Businessolver by encouraging some serious hacking. We cheered on our VP of IT Systems, Tom Pohl, as he headed to Las Vegas to compete at the 23rd annual DEF CON® Hacking Conference  in the Network Forensics Puzzle Contest. Out of four years of competing as an individual, against teams, Tom has consistently placed in the top four each year. We are delighted to announce that this year, he did it again, taking an impressive 2nd place!

Read More

Countdown to DEF CON

Posted by Natalie McLinden on Aug 5, 2015 8:00:00 AM

With the headlines filled to the brim with recent data breaches, it might be hard to flip the switch and view hacking as a good thing. But we’ve found that hacking—and good hacking, at that—to be one of our most prized secret weapons when it comes to data security.

Read More

8 Technical Terms HR Needs to Know to Understand Data Security

Posted by Natalie McLinden on Jun 17, 2015 3:45:00 PM

Let’s face it. IT-speak does not come naturally to most HR leaders. It’s not necessarily what you’re trained in. Who really knows what “encrypted at rest” means, anyway? And why does it matter?

HR leaders are increasingly being asked to dive into the murky waters of cloud technology and data security, and to be able to discuss what they find with their IT people and the C-suite, a quick refresh on technical terms can go a long way. Here are 8 technical terms that HR should know to help bridge the gap when discussing HR technology security and risk.

Read More

5 Ways to Ensure Your Private Exchange Is Secure

Posted by Natalie McLinden on Mar 13, 2015 11:42:00 AM

A private health care exchange involves the sharing of multiple data points and technology platform security should be of utmost importance to companies that are utilizing, or considering, a private exchange. Ryan Keehn, Businessolver’s Assistant VP Information Technology, was recently interviewed by Brian Kalish, online managing editor for Employee Benefit Adviser, in a podcast tackling private exchange security. Ryan brought up five specific points that you should be discussing with your potential (and current) exchange providers to ensure that your data is secure. 

Read More