<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">

24By7Security Blog

SCHEDULE A CALL

Anirudh Nadkarni

Anirudh Nadkarni
Anirudh Nadkarni holds a Bachelor of Arts degree with a major in History from the University of Florida. As a Senior Security Analyst at 24By7 Security, Inc., his main focus in on compliance. Anirudh’s role includes performing on-site Security Risk Assessments, assisting in the development of Privacy and Security Policies & Procedures, and conducting HIPAA training for healthcare providers and their staff. Anirudh is certified as a Health Care Information Security and Privacy Practitioner (HCISPP) from ISC2, and as a Certified Data Privacy Professional (CDPP) from Network Intelligence. Sign up for the 24By7Security blog and follow Anirudh’s musings.

Recent Posts

The 5 Levels of CMMC Explored

In response to the growing number of cyber threats that continue to plague organizations, the Department of Defense[…]

Who Needs to Comply With CMMC?

Before we discuss who needs to comply with the Cybersecurity Maturity Model Certification (CMMC), let's take a quick[…]

Breach Risk Analysis: A four-step plan

Data breaches have long been a nuisance for many industries, including healthcare and financial services. In the age of[…]

Does Your Business Need to Comply with The California Consumer Privacy Act?

When the European Union’s General Data Protection Regulation (GDPR) came into effect, the stipulations of this act had[…]

How Often Should You Review Your Policies and Procedures?

When was the last time your organization reviewed its information security policies and procedures? Although many[…]

Invoice Scams - The New Emerging Threat in Cybersecurity

  Phishing scams have long been an effective social engineering technique used by criminals to adversely affect[…]

How Ethical Hacking can Help you Secure your Business

Is Ethical Hacking the defense strategy your business needs?   What is Ethical Hacking? Hacking is a term that is often[…]

Information Technology Is Not Information Security - Why Both Need to be in Place to Protect your Data

Table of Contents: Why IT and IS both need to be in place to protect your data Lack of Awareness surrounding[…]

Understanding the HIPAA Security Rule: Part II - Technical Safeguards

Welcome to Part II of this series regarding the HIPAA Security rule. As a reminder, the HIPAA Security Rule is broken[…]

Understanding the HIPAA Security Rule: Part I - HIPAA Physical Safeguards

While HIPAA covers a broad scope of healthcare related items, its Security Rule specifically sets forth standards[…]
No More Posts
Subscribe to our Blog!