<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

Phase 3 of NY Cybersecurity Regulation is due by September 1, 2018/ March 1, 2019

This is the third part of a 3-part instructional series from 24By7Security on the New York State Cybersecurity[…]

Understanding the HIPAA Security Rule: Part III – Administrative Safeguards

In the final post of this blog series, we will cover the Administrative Safeguards required for covered entities as set[…]

Phase 2 of NY Cybersecurity Regulation is due by March 1, 2018

This is the second part of a 3-part instructional series from 24By7Security on the New York State Cybersecurity[…]

Cybersecurity on campus: Centers of Higher Education being targeted for Information Breaches

As cyber security threats continue to grow at a steady pace, an alarming trend is forming within the education sector.[…]

Incident response - preparing for attacks

It seems like hardly a week goes by without news of a data breach at yet another company. The reality today is that no[…]

How well tested is your Cybersecurity Incident Response Plan?

You have a solid incident response plan. You are confident that you have included all possible known scenarios for a[…]

How hospitals can protect themselves from ransomware

The world of cyber threats just got even more serious. Forget about corporate espionage just being the stuff of movies,[…]

What are honeypots and how they can secure your network

Imagine you are in a hacker’s basement. We’ll call this hacker Alex. Alex is clicking away, focusing on his screen and[…]
No More Posts
Subscribe to our Blog!