- compliance
- Cybersecurity
- information security
- other
- Personally Identifiable Information
- GLBA
- GLBA safeguards rule
- GLBA Rule for Colleges
- GLBA and higher education
- GLBA for higher ed
- protecting personal financial information
- financial data security
- financial information security
- gramm-leach-bliley act
- PHI
- information technology
- other
- PII
- ccpa
- gdpr
- data security
- personal data protection
- Security Awareness
- data privacy awareness
- privacy regulations
- protecting PII
- protecting PHI
- healthcare
- HIPAA
- HIPAA Risk Assessment
- information security
- OCR
- PHI breach
- HIPAA Breach
- hipaa phi
- healthcare data privacy
- healthcare data breaches
- Office of Civil Rights
- HIPAA Penalties
- healthcare information systems
- healthcare cybercrime
- hospital data breaches
- HIPAA Assessment
- compliance
- Cybersecurity
- information security
- other
- PII
- FTC
- data breach
- cloud security
- Uber Data Breach
- Uber Hacked
- data security incident
- Uber Hack
- Amazon Web Services
- Cybersecurity
- information security
- other
- Gap Assessment
- DoD Contractors
- Registered Provider Organization
- DoD supply chain
- compliance assessment
- CMMC 2.0 compliance
- CMMC 2.0 Readiness
- CMMC levels
- CMMC certification
- C3PAO
- remediation
- cmmc 2.0
- DoD Subcontractors
- RPO
- Data privacy
- Privacy
- other
- ccpa
- privacy law
- gdpr
- data security
- IT Governance
- privacy regulations
- compliance
- Cybersecurity
- HIPAA
- information security
- nist
- other
- ISO/IEC 27001
- PCI DSS
- HITRUST CSF
- security frameworks
- security regulations
- HITRUST Framework
- global security frameworks
- privacy regulations
- protecting PII
- protecting PHI
- compliance
- Cybersecurity
- Data privacy
- HIPAA
- information security
- nist
- PCI-DSS compliance
- other
- ISO-IEC
- HITRUST CSF
- HITRUST Readiness Licensee
- HITRUST Readiness Services
- compliance
- Cybersecurity
- other
- data breaches
- ponemon institute
- internet crime complaints
- cloud vulnerabilities
- BYOD risks
- remote work risks
- work at home
- work from home
- cost of data breach
- phishing exploits
- risky online behavior
- ransomware
- security risk assessment
- malware
- other
- supply chain security
- cybersecurity framework
- Russian hackers
- 24By7Security
- Aarohi Talati
- Akash Deo
- Akhil Deo
- Amanda Spence
- Andrea Richard
- Anirudh Nadkarni
- Arjun Talati
- Benjamin Stukes
- Brian Gomez
- David Jost
- Deepali Shah
- Gabrielle Grau
- Gail Blount
- Juan Carlos Hernandez
- Kelly Alvarez
- Martin Palencia
- Michael Brown
- Nitin Chowdhry
- Parita Patel
- Prakul Neupane
- Randy Rodriguez
- Rema Deo
- Rupal Talati, HCISPP
- Sanjay Deo
- Yashica Nagpal
October, 11 2022
Deadline to Meet Requirements of New Safeguards Rule is December 9th The Gramm-Leach-Bliley Act (GLBA), enacted in[…]
October, 5 2022
Since the birth of digital technology, cybersecurity has become an obvious necessity. This need created the[…]
September, 28 2022
Today, regardless of the industry one is in, cyber-attacks are relevant to their personal lives. This can be seen[…]
September, 26 2022
Latest Uber Data Breach Proves Uber Security is Still Not Up to Speed Uber Technologies, Inc., founded in 2009, is an[…]
September, 20 2022
Attention Department of Defense (DoD) contractors and subcontractors! The Compliance Clock is Ticking for DoD[…]
September, 13 2022
Without trust, products won't sell in the digitized 21st century. According to Harvard Business Review, almost 71[…]
September, 6 2022
Do you ever wish there was a single set of security and privacy rules that incorporated ISO, NIST, PCI, GDPR, HIPAA,[…]
August, 30 2022
HITRUST Readiness Licensee Now Available to Help Clients in Adopting the HITRUST CSF Framework Our readers know that[…]
August, 23 2022
The increased use of cloud services and smart personal devices in the remote workplace is a phenomenon born of our[…]
August, 16 2022
Disruptions in Supply Chain Have Many Causes Since the pandemic turned the world upside down in 2020 and 2021, we’ve[…]