<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">

24By7Security Blog

Subscribe to our Blog!

Medical Device Security Risks: What Healthcare institutions can do

Medical devices, just like any other Internet of Things (IoT) object, are prone to hackers. These hacks can get[…]

Are religious organizations at risk of being hacked?  Seven steps you can take to battle cyber crime

  Table of Contents: Examples of cyber attacks against religious organizations Impact of a hack, theft or a breach[…]

Can you Regain Customer Trust After Being Hacked?

  Table of Contents: Step 1: Get Cybersecure! Step 2: Be Aggressive! Step 3: Cybersecurity Forever! Step 4: Honesty is[…]

FedRAMP 101: Becoming a FedRAMP Authorized CSP (Cloud Service Provider)

What is FedRAMP? FedRAMP (Federal Risk and Authorization Management Program) is an assessment and authorization process[…]

Do Dentists need to comply with HIPAA?

In April 2018, a dental office in New Jersey, Michael Gruber, DMD, PA reported that their computers were hacked and[…]

Understanding the HIPAA Security Rule: Part III – Administrative Safeguards

In the final post of this blog series, we will cover the Administrative Safeguards required for covered entities as set[…]

Understanding the HIPAA Security Rule: Part II - Technical Safeguards

Welcome to Part II of this series regarding the HIPAA Security rule. As a reminder, the HIPAA Security Rule is broken[…]

HIPAA Training is not HIPAA Compliance

We hear from so many doctors’ and dentists’ offices that they are “HIPAA-compliant” because they have completed the[…]

Have you scheduled your first Cybersecurity task for the year? Here are some interesting 2017 statistics.

In the first 2 weeks of 2018, a hospital in Indiana was hacked and held for ransom.   According to Health IT Security[…]

Virtual CISO - A new role for modern business

Over the last several years, the rapid growth of technology has had a large impact in the daily operations of nearly[…]