Follow Us:

Blog

hitrust-csf-certification

An Introduction to HITRUST®

Learn more about HITRUST® CSF Certification. If you have never heard of HITRUST, just starting to learn about HITRUST or actively involved in using HITRUST or searching for a qualified, trusted partner to facilitate your HITRUST certification, this article is for you. We will present a high-level o...
Read More
hipaa-breach-notification-rule

Understanding the HIPAA Breach Notification Rule

What Entities Need to Understand About the HIPAA Breach Notification Rule With Electronic Health Records (EHR) becoming a healthcare industry standard, information security becomes highly critical to protect health records from unauthorized use and disclosure. If a breach of unsecured protected heal...
Read More
experiencing-a-data-breach

What to do After Experiencing a Data Breach

It’s Likely Your Business Will Experience A Data Breach When it comes to security issues related to technology, whether your business experiences a data breach is less a question of “if”, and more a question of “when”. Cybercrime is a multi-trillion dollar industry full...
Read More
Securing-IoT-(Internet of Things)-Devices

7 Tips to Securing IoT (Internet of Things) Devices

When mobile phones were first introduced, if someone were to tell you that your mobile phone could be used to copy your fingerprints or steal passwords to your emails, you would have most likely laughed at them and told them that they have been watching too many science fiction films. However, if so...
Read More
GLBA-Compliance-Requirements

GLBA Compliance Requirements

The Gramm-Leach-Bliley Act which is also known as the Financial Modernization ACT OF 1999, is a United States federal law that requires all financial institutions to ensure the privacy and security of customer (non-public) information. The Act consists of three sections. The Privacy Rule that regula...
Read More