<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

User Cybersecurity Behavior 2023

The State of User Cybersecurity Behavior in 2023 New Internet User Survey Offers a Few Surprises Now in its third year,[…]

Protecting PHI From Online Tracking Risks

Web Tracking Tools Collect PHI, Put Patients at Risk Collectors of Online Patient Data Must Observe HIPAA and FTC[…]

The Dawning Age of Quantum Computing and Its Cybersecurity Implications

The paradigm of computing is about to undergo a radical shift, the implications of which cannot be overstated. Quantum[…]

Security Policies: It’s a Dirty Job, But Somebody’s GOT to Do It!

Security policies and procedures reduce risk and are the foundation of a compliant cybersecurity program Of the dozens[…]

Year-End Cybersecurity Check

As we approach the end of 2023, validate the primary pillars of your cybersecurity program with these five core reviews[…]

The FTC Role in Cybersecurity and Privacy

Federal Trade Commission enforces security and privacy practices to safeguard U.S. consumers and businesses The U.S.[…]

H.R. 7898 Clarification from the OCR

Healthcare providers and business associates must meet clear, specific criteria to benefit from this law On January 5,[…]

New SEC Rule Requires 4-Day Disclosure of Data Breaches

New reporting requirements take effect September 5, 2023. Here's what they mean to you. The Securities and Exchange[…]

Four Steps Required for PCI DSS 4.0 Compliance

Members of the payment card industry, including merchants who accept payment cards, are required to upgrade to v4.0 of[…]
Subscribe to our Blog!