<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

Year-End Cybersecurity Check

As we approach the end of 2023, validate the primary pillars of your cybersecurity program with these five core reviews[…]

How Old is Your Last Security Risk Assessment?

If it was completed more than two years ago, risk assessment requirements say you’re due for an update.

The Role of the CISO in Risk Management: 4 Key Areas to Know

Regardless of company size, staying compliant in the whirlwind of changing regulations is difficult. In addition to a[…]

A CISO’s Perspective: Enhancing Your Cybersecurity Program Effectiveness

Cyber threats are one of the most significant concerns for businesses right now. As organizations become more reliant[…]

Possible Ransomware Attack Takes Hospital Offline for Two Weeks in February

Tallahassee Memorial data breach another upset for healthcare; actions your hospital can take now Tallahassee Memorial[…]

A Threat-Adaptive Framework for Cybersecurity

What it is, how it works, and why you want it The eagerly anticipated update to the HITRUST CSF Framework was announced[…]

Policies and Procedures Required by HIPAA

CISOs of healthcare organizations are responsible for policies and procedures that safeguard the security and privacy[…]

Five Steps to HIPAA Compliance for Your Medical Practice

Read the blog and watch the video! Back by popular demand, here’s a primer on HIPAA compliance for doctors’ offices,[…]

Supply Chain Attacks Revisited

Disruptions in Supply Chain Have Many Causes Since the pandemic turned the world upside down in 2020 and 2021, we’ve[…]

Florida Cybersecurity Act Updated July 1

What Government Entities and Their Strategic Partners Should Know On June 29, 2021, the State Cybersecurity Act (H.B.[…]
Subscribe to our Blog!