byLowers & Associates | July 25, 2017

Risk practitioners tend to categorize risks based on the level of knowledge about the occurrence (known or unknown) and the level of knowledge about the impact (known or unknown).[1]  Known risks can be prioritized by level of impact and…

byLowers & Associates | June 01, 2017

Healthcare security professionals today are directly impacted by the reality of a rapidly changing environment. The security function, as with many others, is being asked to do more with less, while addressing a frightening range of new and increasing…

byLowers & Associates | March 29, 2017

Wikipedia defines social engineering, in the context of information security, as the “psychological manipulation of people into performing actions or divulging confidential information.” Our increasing reliance on vast networks of digital technology for information storage, research, controls, and transactions…

byLowers & Associates | March 01, 2017

The climax of the Academy Awards is imminent, with the announcement of the Best Picture unfolding on the stage. A PricewaterhouseCooper employee has just two red envelopes left in her briefcase. She inadvertently pulls the wrong one, and Faye…

byLowers & Associates | February 23, 2017

An effective and successful healthcare security program requires many different layers of support. Aside from program design, management, and daily staffing, there is also a strategic risk management layer to ensure your program’s direction addresses the most important security…