<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

Can you Regain Customer Trust After Being Hacked?

Table of Contents: Step 1: Get Cybersecure! Step 2: Be Aggressive! Step 3: Cybersecurity Forever! Step 4: Honesty is[…]

Information Technology Is Not Information Security - Why Both Need to be in Place to Protect your Data

Table of Contents: Why IT and IS both need to be in place to protect your data Lack of Awareness surrounding[…]

How Do I Report An Unsecured Protected Health Information (PHI) Breach?

Have you had a HIPAA Breach? Here's how you report it. If you are a covered entity and have experienced the loss or[…]

FedRAMP 101: Becoming a FedRAMP Authorized CSP (Cloud Service Provider)

What is FedRAMP? FedRAMP (Federal Risk and Authorization Management Program) is an assessment and authorization process[…]

Does Your Business Need Cyber Insurance?

So you don’t have cyber insurance? You’re in the same boat as about half of U.S. firms, according to the Insurance[…]

Top 10 tips to stay secure online while traveling this summer

Summer is the time to enjoy traveling and vacations, but do not be lax with your cyber hygiene and follow these top 10[…]

Do Dentists Need To Comply With HIPAA?

In April 2018, a dental office in New Jersey, Michael Gruber, DMD, PA reported that their computers were hacked and[…]

Phase 3 of NY Cybersecurity Regulation is due by September 1, 2018/ March 1, 2019

This is the third part of a 3-part instructional series from 24By7Security on the New York State Cybersecurity[…]

Understanding the HIPAA Security Rule: Part III – Administrative Safeguards

In the final post of this blog series, we will cover the Administrative Safeguards required for covered entities as set[…]

Understanding the HIPAA Security Rule: Part I - HIPAA Physical Safeguards

While HIPAA covers a broad scope of healthcare related items, its Security Rule specifically sets forth standards[…]
Subscribe to our Blog!