<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

Hospitals Under Attack!

Why it’s happening now, and what to do about it Just as the COVID pandemic created new opportunities for hackers,[…]

Crash Course On The Sarbanes Oxley Act

In 2002, the Sarbanes Oxley act was passed. This act is a federal law established to protect shareholders, employees,[…]

4 Important Cybersecurity Resolutions to Make for 2021

Why you need to make them, and how to do it We stand on the brink of a new year. It will be challenging, of course, but[…]

The Vital Role of Physical Security in a Robust Security Program

How physical security augments cybersecurity and closes the circle Every smart business integrates physical security[…]

Five Steps to Become ISO 27001 Certified - And Why You Should

The ISO 27001 standard was developed to assist any size organization in securely managing digital information. It is[…]

Let's Start With The Basics: Security Risk Assessments

Cyber crime is on the rise. New threats and vulnerabilities are discovered every day. Cyber risks are operational risks[…]

Foresight 2020: Establish Your Security Baseline

As we look ahead to 2020, cyber threats will continue to be a top concern for enterprises small and large alike. The[…]

How FFIEC expects financial institutions to manage vendor risk

FFIEC guidelines related to Vendor Risk Management FFIEC (Federal Financial Institutions Examination Council) is one of[…]

MACRA/MIPS and the Annual Security Risk Assessment!

How does MACRA/MIPS affect your practice? As a healthcare provider, you should be familiar with the Merit-based[…]

Are medical devices a security risk for your healthcare organization?

Medical organizations are taking advantage of the IoT (Internet of Things) with Medical Devices Your medical[…]
Subscribe to our Blog!