<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">

24By7Security Blog

Subscribe to our Blog!

MACRA/MIPS and the Annual Security Risk Assessment!

How does MACRA/MIPS affect your practice?  As a healthcare provider, you should be familiar with the Merit-based[…]

Are medical devices a security risk for your healthcare organization?

Medical organizations are taking advantage of the IoT (Internet of Things) with Medical Devices Your medical[…]

New HHS Rule for better patient data access

New Rule for Interoperability, Information Blocking, and the ONC Health IT Certification Program The US Department of[…]

Celebrating National Clean Out Your Computer Day

As Cybersecurity and Compliance experts we are proud to celebrate “National Clean Out Your Computer Day” on February[…]

A Cybersecurity Analyst's view on the NIST CyberSecurity Conference

A look inside the NIST Cybersecurity Conference In November, we sent two of our Security Analysts to the NIST[…]

Six Common HIPAA Violations and how you can prevent them

HIPAA compliance is an ongoing process.  Do you have security and privacy policies and procedures for your[…]

Is Your Staff Ready for the Next Cyber Attack?

As business and society rely increasingly on technology, the data being created and processed is increasing[…]

Why does email encryption matter to your business?

What is email encryption?  Encryption, when applied to data used for email or not, is a process which hides and[…]

November 30 is National Computer Security Day!

Following #NationalCyberSecurityAwareness Month, we celebrate  #ComputerSecurityDay. Help spread the word on social[…]

Safeguarding the Nation's Critical Infrastructure

Critical Infrastructure provides basics in our daily lives including food, water, healthcare, communication and power[…]