<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">

24By7Security Blog

Subscribe to our Blog!

How FFIEC expects financial institutions to manage vendor risk

FFIEC guidelines related to Vendor Risk Management FFIEC (Federal Financial Institutions Examination Council) is one of[…]

MACRA/MIPS and the Annual Security Risk Assessment!

How does MACRA/MIPS affect your practice?  As a healthcare provider, you should be familiar with the Merit-based[…]

Are medical devices a security risk for your healthcare organization?

Medical organizations are taking advantage of the IoT (Internet of Things) with Medical Devices Your medical[…]

Is Your Retail Store Vulnerable to a Cyber Attack?

Retail has always been and remains on the front line of any free market economy. Without retail, there would be no[…]

5 CyberSecurity Frights on Halloween!

5 CyberSecurity Halloween frights! 

Enterprise-wide Risk Analysis: How non-healthcare organizations can learn from HIPAA

Enterprise-wide Risk Analysis Enterprise-wide risk analysis. This was the common theme running through the 11th Annual[…]

Five Steps to HIPAA Compliance for a Doctor's Office

Why do you, as a doctor, dentist or any other medical provider, need to comply with HIPAA? HIPAA, the Health Insurance[…]

Can your business benefit from a part-time CISO?

Can your business benefit from a part-time CISO? Table of Contents: A real story of risks found on a site and how this[…]

Information Technology Is Not Information Security - Why Both Need to be in Place to Protect your Data

Table of Contents: Why IT and IS both need to be in place to protect your data Lack of Awareness surrounding[…]

Eight tips for an effective phishing test at your organization

Eight tips for an effective phishing test at your organization You have provided security training to your employees.[…]