<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

Payment Card Industry Now Offers Members 100 Secure Payment Software Solutions

List of 100 validated software products available on PCI website The list of validated payment software provided on the[…]

How Americans View the Use of Artificial Intelligence in Healthcare

Lessons for healthcare providers from this newest patient survey An enlightening survey conducted by the respected Pew[…]

A CISO’s Perspective: Enhancing Your Cybersecurity Program Effectiveness

Cyber threats are one of the most significant concerns for businesses right now. As organizations become more reliant[…]

Possible Ransomware Attack Takes Hospital Offline for Two Weeks in February

Tallahassee Memorial data breach another upset for healthcare; actions your hospital can take now Tallahassee Memorial[…]

How Artificial Intelligence Can Help Cybersecurity Become More Effective

CIOs and CISOs are using AI in cybersecurity to gain the advantage in the battle for data The use of artificial[…]

CMMC 2.0 Implementation is Just Around the Corner

DoD Contractors and Subs Need to be Pro-Acting Now

Risky Business: Unmanaged Business Associates

Without vendor risk management, suppliers are one of the most loosely managed assets in healthcare Today, an increasing[…]

A Threat-Adaptive Framework for Cybersecurity

What it is, how it works, and why you want it The eagerly anticipated update to the HITRUST CSF Framework was announced[…]

HIPAA Safe Harbor: H.R. 7898's Impact on Healthcare Organizations

By implementing security best practices, HR 7898 enables healthcare providers to potentially decrease enforcement[…]

The Behavioral Economics of Why Executives Overlook Their Cybersecurity Strategy

Human judgment is frequently prejudiced.Decision-makers in cybersecurity often make biased judgments due to using[…]
Subscribe to our Blog!