Blog

How to Find Time for HIPAA Compliance

Work on these small HIPAA compliance steps for at least 10 minutes per day for an entire month.

How Do New Penetration Test Requirements Affect You?

An industry-recognized methodology must be used when conducting a penetration test.

How to Confront Hospital Ransomware

Don’t let your patients’ medical records be taken hostage.

How do PCI Merchant Levels Determine PCI Compliance?

Learn more about PCI merchant levels and how they affect PCI requirements.

How Healthcare Security Complacency is Killing Your Organization

Far too many healthcare organizations are losing data and they don’t even know it.

How Prepared are UK Businesses for GDPR?

The EU General Data Protection Regulation (GDPR) will come into effect on May 25, 2018.

How to Become PCI Compliant: The 2020 Guide to PCI DSS Compliance

Payment Card Industry (PCI) compliance is required for any organization that takes payment cards.

HIPAA Compliant Passwords

Maintaining HIPAA compliant passwords is a key step towards protecting ePHI.

HIPAA Alphabet Soup: Unjumbling the Jargon

HIPAA includes many such acronyms, mostly security-related.

HHS HIPAA Audit Requirements

Don’t forget to document every HIPAA compliance effort as evidence to present to the OCR if your entity is chosen for auditing.

Healthcare's Password Security is Embarrassing

Make the simple change to require unique usernames and passwords on the network level for each one of your staff members.

HIE Insecurity and What One HIE Decided to Do About It

If you’re not sure what your HIE should be doing, have a look at ONC’s health IT security resources.

HIPAA Business Associate Agreement: Who's Really Responsible?

Either manage your business associate security or prepare for a data breach.

HIPAA Security Policy Free Download

Policies help ensure workforce member security.

HIPAA and the Status of Healthcare: What C-suites Should Know

You can’t afford to be passive anymore; it’s time to be aggressive.

How Long are Businesses Vulnerable Before a Security Breach?

On average, a merchant was vulnerable for 470 days before an attacker was able to compromise the system.

Here Comes PCI DSS 3.2: What Changes You Should Expect

See what changes PCI 3.2 brings and what you’ll need to do.

HIPAA Audits Phase 2: What You Need to Know

Learn what’s involved in the Phase 2 HIPAA Audit Program and how you can prepare.

HIPAA Guidelines Simplified in the 2021 HIPAA Guide

Network security is more crucial than ever for healthcare providers.

HIPAA Compliance: Storage in the Cloud

HIPAA Compliance in “the cloud” Cloud data storage is a common and convenient option for healthcare organizations.

Forensic Files: The Case of the Mistaken Malware

The best way to inspire better security practices is to show examples of true security blunders.

Forensic Files: The Case of the Suspiciously Flawless Investigation

What happens when forensic investigators can’t find evidence of a compromise?

Hacking Trends 2014: Hackers Actually Clean Up After Themselves

Hackers are getting smarter than our automated detection tools.

Forensic Files: The Case of the Stockpiled Credit Cards

Hopefully, you'll realize some actions you should take to ensure your own business’ security.