<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

The FTC Role in Cybersecurity and Privacy

Federal Trade Commission enforces security and privacy practices to safeguard U.S. consumers and businesses The U.S.[…]

H.R. 7898 Clarification from the OCR

Healthcare providers and business associates must meet clear, specific criteria to benefit from this law On January 5,[…]

Celebrating 24By7Security: 10 Years in Business

Firm has delivered cybersecurity expertise and compliance services to thousands of clients since July 30, 2013 In just[…]

The High Cost of Incomplete Compliance

HIPAA Compliance That is Less Than 100% is Not Compliance At All

Healthcare Cybersecurity Challenges: A Broken Record

Side A: Ransomware, Hackers / Side B: Aging Medical Devices, Unpatched Software Health records are low-hanging fruit[…]

The Yin and Yang of Artificial Intelligence

Americans Fear a Menacing HAL Takeover While Embracing Beneficial Uses of AI The debate over what types of artificial[…]

To Patch, and Not to Patch

Amid Latest Hacks, Vendor Remediation Solutions Range from Multiple Security Patches to Free Hardware Replacements[…]

Protecting Company Funds from Business Email Compromise Scams

BEC Scams Have Risen Sharply, with More Using Adversary-in-the-Middle Attacks to Access Company Funds Business email[…]

Unmasking the Enemy Within: How to Defend Against Insider Threats

Your biggest risk is also your largest asset. The primary catalyst for insider threats? People. In all critical[…]

Despite Multiple Security Regulations, University Data Breaches Continue

Two universities hacked in three months; who is next? As of 2023, there are 12 accredited universities in the state[…]
Subscribe to our Blog!