As Chief Information Security Officer, Jon Washburn manages the firm’s information governance and security program in alignment with established national and international standards and the firm’s strategic plan. Jon acts as the firm’s “Compliance Officer” as necessary and/or required by regulatory agencies and works directly with the Chief Operating Officer and Firm Counsel to maintain a strong enterprise information governance and security posture through policy, strategy, operational processes and training programs.
WPA2 is the “secure” implementation option used by the vast majority of enterprise WiFi systems – other protocols have their own security issues, which is why everyone moved to WPA2. Unfortunately, researches have found a way to break that security. The good news is, for most attacks the attacker has to be on the same access … Continue Reading
A good lesson for technology providers: if security researchers reach out to you, acknowledge them as quickly as possible, especially when they’ve discovered a critical vulnerability. If you work with them to remediate the issue, you may be able to get a patch out before they feel the need to publish the vulnerability for the … Continue Reading
Free and Open-Source Software (FOSS) is computer software that can be classified as both free software and open-source software. Anyone who wishes to use FOSS is freely licensed to use, copy, study, and change the software in any way, and the source code is openly shared so that people are encouraged to voluntarily improve upon … Continue Reading
If you’ve been looking for a simple tool to help you with an initial self-assessment of how compliant you are with the HIPAA Security Rule, the ONC – in collaboration with the HHS Office for Civil Rights (OCR) and the HHS Office of the General Counsel (OGC) – developed a downloadable tool to help guide … Continue Reading
As you work to finalize your cyber insurance riders or supplemental policies, it’s important to pay attention to the language around what is specifically covered. To ensure you’re receiving the coverage desired, the first step is to understand the difference between hacking and phishing, and how this is being applied to your policy, and to … Continue Reading