- #CyberAware
- Cybersecurity
- DontRiskItSecureIt
- other
- dod
- SIMPLIFY_CMMC
- Registered Provider Organization
- CMMC Readiness service
- DoD supply chain
- contractor certification
- compliance assessment
- CMMC Compliance
- supply chain security
- CMMC Preparedness
- help with CMMC compliance
- Cybersecurity
- information security
- security risk assessment
- other
- cybercrime
- data security
- change passwords
- security resources
- patch software
- software updates
- security webinars
- security newsletters
- new year's resolutions
- #CyberAware
- Cybersecurity
- information security
- DontRiskItSecureIt
- other
- COVID19 scams
- cybercrime
- data security
- pandemic
- security hacks
- COVID
- 2020 security hacks
- #CyberAware
- information security
- PCI compliance
- PCI-DSS compliance
- DontRiskItSecureIt
- other
- data security
- what is PCI DSS
- PCI
- Payment Card Industry
- payment card processors
- PCI DSS
- data security standard
- cardholder data
- PCI Compliance Requirements
- Cybersecurity
- hackers
- safe holidays
- DontRiskItSecureIt
- other
- 12 days of Christmas
- 12 days of Christmas hacks
- healthcare
- HHS
- hipaa enforcement
- OCR
- protected health information
- healthcare data privacy
- employee sanctions
- employee HIPAA violations
- disciplinary actions
- patient privacy
- financial penalties
- office for civil rights
- HIPAA regulation
- Cybersecurity
- other
- CMMC
- dod
- SIMPLIFY_CMMC
- DoD Contractors
- CMMC Readiness
- Registered Provider Organization
- defense contractor security
- CMMC Readiness service
- CMMC accreditation board
- DoD supply chain
- contractor certification
- compliance assessment
- cmmc RPO
- healthcare
- gdpr
- contact tracing
- personal data protection
- contact tracing software
- contract training technology
- healthcare data privacy
- financial data privacy
- credit card data privacy
- Cybersecurity
- HIPAA
- information security
- internet of things
- security risk assessment
- other
- IoT
- data security
- security guards
- physical security
- SOX
- Sarbanes Oxley
- security alarms
- security cameras
- access control
- internal controls
- physical security testing
- security risk assessment
- other
- HIPAA Compliance vs pandemic
- gdpr
- Gap Assessment
- data security
- ISMS
- ISO
- security standards
- ISO/IEC 27001
- 27001 Certification
- ISMS certification
- 24By7Security
- Aarohi Talati
- Akash Deo
- Akhil Deo
- Amanda Spence
- Andrea Richard
- Anirudh Nadkarni
- Arjun Talati
- Benjamin Stukes
- Brian Gomez
- David Jost
- Deepali Shah
- Gabrielle Grau
- Gail Blount
- Kelly Alvarez
- Martin Palencia
- Michael Brown
- Nitin Chowdhry
- Parita Patel
- Prakul Neupane
- Randy Rodriguez
- Rema Deo
- Rupal Talati, HCISPP
- Sanjay Deo
- Yashica Nagpal
January, 12 2021
As of Nov 2021, CMMC 2.0 was introduced and the information below may not apply in its entirety. Authorized RPOs Are[…]
January, 8 2021
Why you need to make them, and how to do it We stand on the brink of a new year. It will be challenging, of course, but[…]
January, 4 2021
What we can learn from these three cybercrimes? We don’t need to state the obvious – that 2020 was a year of anomaly –[…]
December, 29 2020
How All Stakeholders Can Achieve Compliance By the year 2000, cybersecurity threats were evolving at a record pace and[…]
December, 22 2020
On the first day of Christmas, a hacker sent to me a malware virus in a pear tree. (!) On the second day of Christmas,[…]
December, 15 2020
What Employee Sanctions Are Appropriate? The HIPAA Security and Privacy Rules were enacted to effectively address the[…]
December, 7 2020
As of Nov 2021, CMMC 2.0 was introduced and the information below may not apply in its entirety. The Value of Using RPO[…]
December, 1 2020
Contact tracing and vaccine development are top priorities in the public health arena during COVID. But what are the[…]
November, 24 2020
How physical security augments cybersecurity and closes the circle Every smart business integrates physical security[…]
November, 17 2020
The ISO 27001 standard was developed to assist any size organization in securely managing digital information. It is[…]