Blog

IMG_0549

Compliance vs. Security

My associate at Rook Security, Jeff Foresman, spoke at three information security events in the past few weeks about how to build a secure compliance program. The questions asked and discussions that happened at the end of each of Jeff’s presentations were complex and spirited. The frustration that many information security and compliance professionals (often […]

View
Brian with some of his oldest friends at their 40th High School reunion.

Employee Spotlight: Brian T. O’Hara

Welcome to our Employee Spotlight blog series, which features Q&A’s from Rook employees as a fun way for you to get to know our team. Name: Brian T. O’Hara Title: Sr. Security Advisor Time at Rook: 6 months Current City: Fort Wayne, IN Hometown: Nashville, IN What has been your favorite memory/achievement working at Rook Security? Having J.J. say […]

View
HIPPA_FAQ

HIPAA FAQ – ePHI Storage

This series of blog posts features FAQs regarding the HIPAA Security Rule. Can Electronic Protected Health Information (ePHI) be stored outside the US? The Affordable Care Act changed the reimbursement model and has forced providers to cut costs. Health IT (HIT) is turning to the cloud so they can do more with less in modern healthcare. Infrastructure […]

View
ES_MikeChilds_web

Employee Spotlight: Mike Childs

Welcome to our Employee Spotlight blog series, which features Q&A’s from Rook employees as a fun way for you to get to know our team. Name: Mike Childs Role: Enterprise Sales Time at Rook: 6 months Current City: Avon, IN Hometown: Westfield Center, OH Before working at Rook Security, what was the most unusual or […]

View
rook uncut stacked logo (2)

Rook Uncut: How to Shift from an IT to a Security Career

With new data breaches or information security concerns making headlines each day, we are often approached by peers, friends, family, and the media to provide insight. Rook Uncut gives you our quick and raw answers to security questions. If you missed the last edition of Rook Uncut, check it out here. In this post, I […]

View
march madness-02

March Madness: An IT Security Nightmare

Ah, NCAA March Madness. The time of year that fans love, gamblers dream of, and IT security professionals should dread.   The March Madness tournament is an unstoppable force that fans will follow anywhere and in any way that they can. More than 50 million Americans participate in office bracket pools each year, with only […]

View
pci_ssc_qsa1

PCI DSS: 5 Best Practices changing to Requirements in July 2015

On July 1, 2015, the PCI Data Security Standard (DSS) has five requirements that will be transitioning from best practices to full requirements. These requirements were included in the October 2013 release of the PCI DSS version 3.0 as best practices to allow organizations to implement controls to meet the standard when they became requirements.  […]

View
EmployeeSpotlight_DustinMinor

Employee Spotlight: Dustin Minor

Welcome to our Employee Spotlight blog series, which features Q&A’s from Rook employees as a fun way for you to get to know our team. Name: Dustin Minor Title: IT OPS Intern Time at Rook: 2 months Current City: Columbus, IN Hometown: Columbus, IN Before working at Rook Security, what was the most unusual or interesting job […]

View
rook uncut stacked logo (2)

Rook Uncut: Successful Social Engineering Stories

With new data breaches or information security concerns making headlines each day, we are often approached by peers, friends, family, and the media to provide insight. Rook Uncut gives you our quick and raw answers to security questions. If you missed the last edition of Rook Uncut, check it out here. Chris Blow, Security Consultant at […]

View
Slimstat

Slimstat Vulnerability: What You Should Know

More than one million websites that run on WordPress are under the risk of being hijacked by attackers exploiting critical vulnerability in most versions of a plugin called WP-Slimstat. As of yet, there have been no significant attacks, mostly the normal Internet noise. What is the attacker’s goal? The end goal for the attacker is […]

View