- compliance
- Cybersecurity
- Data privacy
- other
- customer data
- GLBA
- consumer data
- FCRA
- Federal Trade Commission
- FCT Act
- nist cybersecurity framework
- security risk assessment
- other
- hipaa security rule
- ISO/IEC 27001
- PCI DSS
- HITRUST CSF
- GLBA
- security frameworks
- security regulations
- cmmc 2.0
- compliance
- Cybersecurity
- HIPAA
- nist
- other
- PCI DSS
- HITRUST
- cybersecurity framework
- GLBA
- University data breaches
- College data breach
- protecting financial data
- Protecting credit card data
- Student data breach
- Protecting healthcare data
- compliance
- Cybersecurity
- information security
- other
- Personally Identifiable Information
- GLBA
- GLBA safeguards rule
- GLBA Rule for Colleges
- GLBA and higher education
- GLBA for higher ed
- protecting personal financial information
- financial data security
- financial information security
- gramm-leach-bliley act
- compliance
- Cybersecurity
- HIPAA
- nist
- PCI-DSS compliance
- risk mitigation
- security risk assessment
- other
- Security Risk Status Reporting
- top ten security risks
- mitigating risks
- GLBA
- 24By7Security
- Aarohi Talati
- Akash Deo
- Akhil Deo
- Amanda Spence
- Andrea Richard
- Anirudh Nadkarni
- Arjun Talati
- Benjamin Stukes
- Brian Gomez
- David Jost
- Deepali Shah
- Gabrielle Grau
- Gail Blount
- Kelly Alvarez
- Martin Palencia
- Michael Brown
- Nitin Chowdhry
- Parita Patel
- Prakul Neupane
- Randy Rodriguez
- Rema Deo
- Rupal Talati, HCISPP
- Sanjay Deo
- Yashica Nagpal
August, 29 2023
Federal Trade Commission enforces security and privacy practices to safeguard U.S. consumers and businesses The U.S.[…]
July, 25 2023
If it was completed more than two years ago, risk assessment requirements say you’re due for an update.
June, 6 2023
Two universities hacked in three months; who is next? As of 2023, there are 12 accredited universities in the state[…]
October, 11 2022
Deadline to Meet Requirements of New Safeguards Rule is December 9th The Gramm-Leach-Bliley Act (GLBA), enacted in[…]
February, 8 2022
Keeping a watchful eye on your organization’s most serious security risks is a challenge in the best of circumstances.[…]
No More Posts