Sara A.

Sara is an eclectic and passionate technical writer, with a high interest in health and information security. Her contribution to InfoSec Institute started in 2016 with a series of articles in Health and IT, from which she extended her expertise to information security in other fields.
Sara A.

How Secure Wire Transfer Procedures Can Prevent Business Email Compromise

Introduction Formerly known as the “man in the email attack,” business email compromise (BEC) is a scam that takes control of a senior employee’s email acco

Phishing Attacks in the Manufacturing Industry

Introduction In the second quarter of 2017, the manufacturing industry was the most targeted by cyber-attacks, with 24% of attacks globally, according to NNT

Phishing Attacks in the Not-For-Profit Industry

Introduction Although the non-profit sector is not in the top phished industries of 2017, it is not as safe as one may think. The statistics from Privacy Rig

Security+: Mitigating Security Risks in Static Environments (SY0-401) [DECOMMISSIONED ARTICLE]

NOTE: This article reflects an older version of the Security+ Exam – please see the current Security+ Certification page for the most up-to-date information.

CISSP: Disaster recovery processes and plans

This article is part of our CISSP certification prep series. For more CISSP-related resources, see our CISSP certification hub. Disaster recovery is the p

Change management and the CISSP

This article is part of our CISSP certification prep series. For more CISSP-related resources, see our CISSP certification hub. When a business begins to 

HIPAA Security Rule

What is the HIPAA security rule? The Health Insurance Portability and Accountability Act (HIPAA) is a US law that came into force in 1996 in order to ensure

HIPAA and IT Security

The health care system, and the research organizations within it, is a sensitive sector and one of the most exposed to privacy risks, which makes the securit

Security Risk Assessment in Health Care

Introduction Security Risk Assessment in Care Settings are intended to protect and secure health information (electronic protected health information or ePHI

Risk Management in Healthcare

Definition Following security risk assessment, security risk management is the second step of the security management process standard, which is the first ad