<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">

24By7Security Blog

Subscribe to our Blog!

How FFIEC expects financial institutions to manage vendor risk

FFIEC guidelines related to Vendor Risk Management FFIEC (Federal Financial Institutions Examination Council) is one of[…]

World Backup Day - Back it up!

March 31st is a really important day that you should always celebrate.  It’s World Backup day! Yes, the calendar has[…]

MACRA/MIPS and the Annual Security Risk Assessment!

How does MACRA/MIPS affect your practice?  As a healthcare provider, you should be familiar with the Merit-based[…]

Are medical devices a security risk for your healthcare organization?

Medical organizations are taking advantage of the IoT (Internet of Things) with Medical Devices Your medical[…]

New HHS Rule for better patient data access

New Rule for Interoperability, Information Blocking, and the ONC Health IT Certification Program The US Department of[…]

Celebrating National Clean Out Your Computer Day

As Cybersecurity and Compliance experts we are proud to celebrate “National Clean Out Your Computer Day” on February[…]

A Cybersecurity Analyst's view on the NIST CyberSecurity Conference

A look inside the NIST Cybersecurity Conference In November, we sent two of our Security Analysts to the NIST[…]

Six Common HIPAA Violations and how you can prevent them

HIPAA compliance is an ongoing process.  Do you have security and privacy policies and procedures for your[…]

Is Your Staff Ready for the Next Cyber Attack?

As business and society rely increasingly on technology, the data being created and processed is increasing[…]

Why does email encryption matter to your business?

What is email encryption?  Encryption, when applied to data used for email or not, is a process which hides and[…]