- compliance
- Cybersecurity
- Data privacy
- HIPAA
- information security
- nist
- PCI-DSS compliance
- other
- ISO-IEC
- HITRUST CSF
- HITRUST Readiness Licensee
- HITRUST Readiness Services
- compliance
- Cybersecurity
- other
- data breaches
- ponemon institute
- internet crime complaints
- cloud vulnerabilities
- BYOD risks
- remote work risks
- work at home
- work from home
- cost of data breach
- phishing exploits
- risky online behavior
- compliance
- Cybersecurity
- healthcare
- HIPAA Risk Assessment
- OCR
- PHI
- protected health information
- risk assessment
- hipaa security rule
- office for civil rights
- phishing schemes
- known vulnerabilities
- top cyberattacks in healthcare
- compliance
- Cybersecurity
- healthcare
- OCR
- PHI
- protected health information
- security risk assessment
- Enterprise-wide Risk Analysis
- HIPAA Privacy Rule
- hipaa security rule
- office for civil rights
- hospital data breaches
- HIPAA Assessment
- Cybersecurity
- information security
- other
- Registered Provider Organization
- DoD supply chain
- compliance assessment
- preparing for CMMC 2.0
- CMMC 2.0 compliance
- CMMC 2.0 Readiness
- CMMC levels
- CMMC certification
- C3PAO
- compliance
- Cybersecurity
- healthcare
- HIPAA
- ePHI
- protected health information
- security risk assessment
- Risk Analysis
- data breach
- HIPAA Privacy Rule
- hipaa security rule
- patient privacy
- security incident
- e-PHI
- risk analysis steps
- compliance
- Cybersecurity
- ransomware
- security risk assessment
- cybersecurity awareness
- CISA
- data backup
- security updates
- krebs security
- independence day
- American Freedoms
- freedom from cybercrime
- easy hacks
- known vulnerabilities
- CVE
- compliance
- Cybersecurity
- other
- cybercrimes in 2022
- war on Ukraine
- Russian hackers
- Red Cross hacked
- oil supply attacks
- LockBit
- Conti
- political cybercrimes
- cybercrime for profit
- PressReader hacked
- GiveSendGo hacked
- cryptocurrency stolen
- Block Inc hacked
- Cybersecurity
- nist cybersecurity framework
- other
- CMMC
- defense contractor
- CMMC audit
- dod
- CMMC Compliance
- preparing for CMMC 2.0
- CMMC 2.0 prepardness
- CMMC 2.0 compliance
- cyber security
- Cybersecurity
- healthcare
- HIPAA
- Privacy
- protected health information
- ransomware
- Security
- security assessment
- 24By7Security
- Aarohi Talati
- Akash Deo
- Akhil Deo
- Amanda Spence
- Andrea Richard
- Anirudh Nadkarni
- Arjun Talati
- Benjamin Stukes
- Brian Gomez
- David Jost
- Deepali Shah
- Gabrielle Grau
- Gail Blount
- Kelly Alvarez
- Martin Palencia
- Michael Brown
- Nitin Chowdhry
- Parita Patel
- Prakul Neupane
- Randy Rodriguez
- Rema Deo
- Rupal Talati, HCISPP
- Sanjay Deo
- Yashica Nagpal
August, 30 2022
HITRUST Readiness Licensee Now Available to Help Clients in Adopting the HITRUST CSF Framework Our readers know that[…]
August, 23 2022
The increased use of cloud services and smart personal devices in the remote workplace is a phenomenon born of our[…]
August, 2 2022
In addition to tracking and imposing penalties for HIPAA violations and data breaches, the U.S. Department of Health &[…]
July, 19 2022
In the first six months of 2022, hospitals across the U.S. reported 57 data breaches to the HHS Office for Civil[…]
July, 12 2022
CMMC 2.0 Compliance – Why You Can’t Wait Do you support the U.S. Department of Defense (DoD) either directly as a[…]
July, 5 2022
For nearly a year, Lisa J. Pino has served as Director of the U.S. Department of Health and Human Services (HHS) Office[…]
June, 28 2022
Independence Day in America is a huge national event that we celebrate in many ways. Americans prize their freedoms[…]
June, 21 2022
The profit motive has long been a primary driver of cybercrime around the globe. However, when we reviewed some of the[…]
June, 14 2022
For businesses, suppliers, and contractors working with the Department of Defense, CMMC 2.0 is a contractual[…]
June, 7 2022
How often do we hear a provider say – “My priority is my patient, I don’t have time for other things”. Well, it is a[…]