Jim Nash on EmailJim Nash on Linkedin
Jim Nash
Information Security Evangelist at FRSecure
Jim's experiences in both politics and the InfoSec industry have cultivated him into a strong and animated communicator that has the ability to crystallize difficult concepts into digestible ideas. These skills and experiences have morphed him into a cybersecurity and information security evangelist, focusing on publicizing the need for organizations to make cyber threats a business liability and not just an IT problem.

Entries by Jim Nash

, , , ,

Anatomy of a Spear Phishing Attack

Spear phishing is an attempt at gaining access to someone’s information using a very targeted and specific approach. It is a common occurrence in the U.S., and it happens virtually every day. Because of that, you should become familiar with the tricks that these criminals use to get people to fall prey to their attacks. Here are some tips for identifying a spear phishing email.

, , , , , ,

HIPAA Compliance Doesn’t Have to Be Like Pulling Teeth

If your healthcare practice is transmitting data in a way that doesn’t comply with HIPAA regulations, you’re facing more than just potential fines. Behind every piece of data is a person who would be affected greatly if that data was leaked. Here are some ways that your practice can both be compliant and protect people.

, , ,

The Business Impact of a Data Breach

A data breach has a business impact that extends far beyond the responsibilities of your IT department. For this reason, organizations need to think about treating information security and cybersecurity like a business issue rather than an IT one. When preparing and approving an IT budget for your company for next year, think about the effects a data breach might have on your organization and why it’s important to build defenses against them.