CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing Vulnerability Scans and Penetration Tests: What’s the Difference? We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…Jordan KeatingApril 27, 2021
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration TestingPhishingRansomware Top 5 Security Threats of 2020 and What You Can do About It One of the first known malicious computer attacks was created in 1989 by evolutionary biologist…Jordan KeatingJanuary 15, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA ViolationsPenetration TestingPhishing Types of Phishing Phishing attempts can come in all sorts of shapes and sizes. It can be attempted…Jordan KeatingJuly 10, 2020
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing Vulnerability Scans and Penetration Tests: What’s the Difference? We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…Jordan KeatingJuly 7, 2020
Penetration Testing Healthcare IT Security- The Case For Penetration Testing HIPAA law requires covered entities to safeguard against “reasonably anticipated” threats to protected health information. With…BOCadminMay 27, 2019