- compliance
- Cybersecurity
- other
- FBI
- common cybercrimes
- business email compromise
- email account compromise
- cybercrime complaint center
- cost of cybercrime
- robocalls
- compliance
- Cybersecurity
- #cybersecurity awareness training
- risk assessment
- security assessment
- security risk assessment
- other
- security training
- teamwork
- software patches
- memorial day
- remembering
- compliance
- Cybersecurity
- healthcare
- HIPAA
- identity theft
- healthcare fraud
- healthcare cybercrime
- FBI investigations
- medical billing fraud
- medical fraud
- compliance
- Cybersecurity
- ransomware
- other
- spoofed email
- spoofed websites
- website spoofing
- email spoofing
- blackcat ransomware
- FBI cybercrime complaints
- FBI cybercrime alerts
- compliance
- Cybersecurity
- Payment Card Industry
- PCI DSS
- women in tech
- gender bias in tech
- women in payments
- women in tech statistics
- state of cybersecurity report
- security standards council
- ISACA cybersecurity report
- TrustRadius women in tech survey
- compliance
- Cybersecurity
- security strategy
- other
- hipaa security rule
- NIST Security Framework
- security strategic planning
- security frameworks
- security regulations
- Cybersecurity
- other
- data security
- PCI DSS
- PCI Compliance Requirements
- cardholder data environment
- PCI Security Standard
- PCI DSS assessment
- cardholder security
- credit card data breaches
- credit card transactions
- credit card fraud
- Cybersecurity
- other
- identity management
- identity management day
- identity management day 2022
- password security
- access management
- password theft
- password policy
- login credentials
- compliance
- Cybersecurity
- healthcare
- PHI
- vCISO
- virtual ciso
- PII
- data breaches
- business associate security
- vendor security review
- business associate security review
- supplier security review
- Cybersecurity
- healthcare
- HIPAA compliance
- HIPAA Privacy Rule
- hipaa security rule
- corrective actions
- NIST information security handbook
- HHS OCR corrective actions
- patient right of access
- security improvements
- 24By7Security
- Aarohi Talati
- Akash Deo
- Akhil Deo
- Amanda Spence
- Andrea Richard
- Anirudh Nadkarni
- Arjun Talati
- Benjamin Stukes
- Brian Gomez
- David Jost
- Deepali Shah
- Gabrielle Grau
- Gail Blount
- Kelly Alvarez
- Martin Palencia
- Michael Brown
- Nitin Chowdhry
- Parita Patel
- Prakul Neupane
- Randy Rodriguez
- Rema Deo
- Rupal Talati, HCISPP
- Sanjay Deo
- Yashica Nagpal
May, 31 2022
There are a number of resources in the U.S. who collect data about cybercrime, and the FBI’s Internet Cybercrime[…]
May, 24 2022
As Memorial Day approaches, our thoughts turn to backyard barbeques, boating, and beer. Sunscreen on our noses, picnics[…]
May, 17 2022
Did you know that the FBI is the lead federal agency responsible for investigating cyberattacks? Their role includes[…]
May, 10 2022
The art of spoofing has been around since time immemorial, or so it seems. Spoofing can take a humorous form as a[…]
May, 3 2022
It wasn’t long ago that the first women began to enter the technology field, specifically in computer science and[…]
April, 26 2022
Every cybersecurity program or information security program needs a guiding light. A beacon that shows the way. A[…]
April, 19 2022
Non-compliance remains a serious problem, as these breaches and statistics confirm Americans are in love with credit,[…]
April, 12 2022
Today, April 12, is Identity Management Day 2022. The Identity Defined Security Alliance (IDSA) and the National Cyber[…]
April, 5 2022
Security and privacy requirements are specified in a variety of federal regulations that apply to healthcare[…]
March, 29 2022
Experience has made us all true believers in cybersecurity and solid information security programs. We understand that[…]