Trillium Insights

Thoughts and Insights from Trillium's Practice Leaders

Am I Secure, Where Do I Start?

Am I Secure, Where Do I Start?

If your business is responsible for maintain the privacy of Protected Health Information (PHI,) you are inevitably familiar with Health Insurance Portability and Accountability (HIPAA) data security regulations.  HIPAA governs the sharing of such information, both for electronic and paper rec... Continue reading…

What does building Security into your development lifecycle mean?

What does building Security into your development lifecycle mean?

Part of the system development lifecycle includes the relationship between development teams and operations teams.  DevOps is shorthand for development and operations – a software development phase originally used in Agile methodology that enables systems to be more rapidly deployed and... Continue reading…

What Caused the Cybersecurity Breach?

What Caused the Cybersecurity Breach?

Over the last 12 months, we have all read news stories about cybersecurity breaches that have occurred at very well-known organizations.  The stories tend to focus on the number of people that are potentially impacted by the breach – a good piece of information to know.  Many of th... Continue reading…

5 Signs of a Strong Leader

5 Signs of a Strong Leader

I read several articles over the holiday weekend about the traits of an effective leader.  It is a topic that I am passionate about, so I want to share some of what I read and what I took away from the articles.   1. They build trust. Strong leaders know that trust is essential to bu... Continue reading…