- DontRiskItSecureIt
- other
- Exchange server hack
- Microsoft hack
- China hack
- hafnium
- SolarWinds
- Exchange software updates
- Microsoft vulnerabilities
- CISA
- Cybersecurity
- healthcare
- HIPAA compliance
- information security
- nist cybersecurity framework
- Privacy
- hipaa security rule
- data security
- PCI DSS
- HITRUST
- HITRUST cybersecurity framework
- ISO-IEC
- HITRUST CSF
- compliance
- Cybersecurity
- information security
- security strategy
- vCISO
- virtual ciso
- DontRiskItSecureIt
- other
- risk management
- security expertise
- security programs
- business solutions
- Cybersecurity
- DontRiskItSecureIt
- other
- cyberattacks
- predictive analytics
- prescriptive analytics
- data-driven decisions
- business improvements
- data analytics
- big data
- descriptive analytics
- diagnostic analytics
- cyberthreats
- Cybersecurity
- DontRiskItSecureIt
- other
- data security
- PCI DSS
- PCI Compliance Requirements
- credit card security
- cardholder data environment
- PCI Security Standard
- cardholder data security
- healthcare
- HIPAA compliance
- security risk assessment
- DontRiskItSecureIt
- Hospital cybersecurity
- hospital security
- security evaluation
- incident response plan
- healthcare data breaches
- hospital compliance
- PCI-DSS compliance
- other
- cardholder data
- Compliance Tracking Tool
- compliance reporting tool
- prioritized approach to PCI compliance
- credit card security
- security requirements
- cardholder data environment
- qualified security assessor
- security milestones
- compliance options
- cybersecurity 101
- information security
- risk assessment
- risk mitigation
- security assessment
- security risk assessment
- Risk Analysis
- other
- vulnerability assessment
- risk management
- SOX
- Sarbanes Oxley
- Cybersecurity
- Data privacy
- data privacy day
- information security
- stay safe online
- other
- NCSAM
- data security
- information privacy
- national cybersecurity alliance
- own your privacy
- respect privacy
- cyber aware
- cyber hygiene
- Cybersecurity
- #Cybersecurity awareness month
- information security
- lessons learnt
- stay safe online
- information technology
- other
- Cybersecurity Month
- online safety
- education
- remote workforce
- WFH
- cybersecurity awareness
- 24By7Security
- Aarohi Talati
- Akash Deo
- Akhil Deo
- Amanda Spence
- Andrea Richard
- Anirudh Nadkarni
- Arjun Talati
- Benjamin Stukes
- Brian Gomez
- David Jost
- Deepali Shah
- Gabrielle Grau
- Gail Blount
- Kelly Alvarez
- Martin Palencia
- Michael Brown
- Nitin Chowdhry
- Parita Patel
- Prakul Neupane
- Randy Rodriguez
- Rema Deo
- Rupal Talati, HCISPP
- Sanjay Deo
- Yashica Nagpal
March, 23 2021
What You Should Know, What You Should Do On March 2, 2021, Microsoft announced that certain Exchange Servers supporting[…]
March, 16 2021
Six Things You Should Know As the volume of data has exploded in the information age, an increasingly complex web of[…]
March, 9 2021
Businesses Can Now Hire a Chief information Security Officer On a Part-Time or Virtual Basis In the digital age, with[…]
March, 2 2021
The Value of Data Analytics In The Future of Cybersecurity We live and work in the Information Age, sometimes called[…]
February, 23 2021
Merchants Who Accept Credit Cards Can take these 4 steps to achieve compliance and peace of mind There were more than[…]
February, 16 2021
Why it’s happening now, and what to do about it Just as the COVID pandemic created new opportunities for hackers,[…]
February, 9 2021
Using the Prioritized Approach Tool To Track and Report Progress In 2006, the payment card industry (PCI) established[…]
February, 2 2021
In 2002, the Sarbanes Oxley act was passed. This act is a federal law established to protect shareholders, employees,[…]
January, 25 2021
January 28th is a vital reminder to businesses and consumers Each year on January 28, an international initiative known[…]
January, 19 2021
Do Not Be Caught with Your Pants Down Along with the change of many people's work environment in 2020, there are rising[…]