<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

Using the NIST Cybersecurity Framework

Many organizations are using the NIST Cybersecurity Framework for developing and maintaining their enterprise-wide[…]

HIPAA enforcement trends - What is OCR doing?

Iliana Peters recently provided a thorough update of HIPAA enforcement trends as well as a road map to OCR’s current[…]

Detecting Insider Threats

What is an insider threat? According to the computer emergency response team (CERT), when a current or former employee[…]

Is it secure to pay with a credit or debit card at restaurants?

It is every business's responsibility to ensure credit card or debit card security and to protect the data and privacy[…]

NY State Cybersecurity Regulations – Are you prepared?

Are YOU prepared for the New York State Cybersecurity Regulations that are in effect since March 1, 2017? All financial[…]

Security and Privacy for Telemedicine

Security and Privacy for Telemedicine Telemedicine is taking the medical world by storm. And one can easily see why.[…]

HIPAA OCR Enforcement Actions against Business Associates

HHS’ Office for Civil Rights is responsible for enforcing the Privacy and Security Rules on HIPAA covered entities.[…]

Who is a HIPAA Security Officer, and why do you need one?

If you are a medical practice or “covered entity”, you need a HIPAA Security Officer. As required in 45 C.F.R. §[…]

Overview of FERPA for Student Data Privacy

Educational institutions need to comply with the Family Education Rights and Privacy Act (FERPA) of 1974, also called[…]

Announcement of merger

HIPAA-HITECH-SOLUTIONS, Inc. and 24By7Security, Inc. merge to provide higher benefits of common cyber security services[…]
Subscribe to our Blog!