<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

Women in Tech: Obstacles & Opportunities

It wasn’t long ago that the first women began to enter the technology field, specifically in computer science and[…]

What is Guiding Your Security Program?

Every cybersecurity program or information security program needs a guiding light. A beacon that shows the way. A[…]

How a Vendor Security Review Helps Maintain Your Own Compliance

Security and privacy requirements are specified in a variety of federal regulations that apply to healthcare[…]

You Probably Need a Security Governance Committee, and Here’s Why

There are many benefits to having a security governance committee in your organization. In this blog, we examine some[…]

7 Reasons Why Security Risk Status Reporting is a Great Idea

Keeping a watchful eye on your organization’s most serious security risks is a challenge in the best of circumstances.[…]

The Value of a Virtual CISO During the Pandemic

Businesses Can Now Hire a Chief information Security Officer On a Part-Time or Virtual Basis In the digital age, with[…]

How the Newly Enacted ONC and CMS Healthcare Rules Affect You

Two new rules enacted in 2020 affect healthcare providers, insurers, and other healthcare industry constituents by[…]

Service Providers Gain a Competitive Edge with SOC Reports

We live and work in a society that has become extensively regulated. Regulations have evolved over time with the[…]

5 steps to create a Culture of Ethics and Compliance

You hear the words "ethics" and "compliance" being used a lot in terms of businesses and whether they are doing the[…]

OCR Priorities for 2019-2020

In the recent HIPAA conference organized by the Office for Civil Rights (OCR) and National Institute of Standards and[…]
Subscribe to our Blog!