CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy National Cybersecurity Awareness Month The Cybersecurity & Infrastructure Security Agency (CISA) is in the middle of their National Cybersecurity…Jordan KeatingOctober 21, 2020
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy Policy and Procedure Review Some organizations have their annual policy review date already set and others might have a…Jordan KeatingOctober 15, 2020
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy Where is your organization’s data? Our blogs have covered the importance of keeping hardware and software secure. That can be…Jordan KeatingOctober 9, 2020
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy The Impact of a Breach The Office of Civil Rights (OCR) has recently settled with two organizations on major breaches…Jordan KeatingSeptember 30, 2020
CybersecurityHIPAAHIPAA SecurityHIPAA Violations Do you know who is visiting your facilities? If your organization is in long term care, you’re all too familiar with visitors coming…Jordan KeatingSeptember 24, 2020
CybersecurityEthical HackingHIPAAHIPAA Security Mitigating the Risks of Relay Authentication Attacks So, now that we have explained how the attacker can get access, it’s time to…BOCadminSeptember 18, 2020
CybersecurityEthical HackingHIPAAHIPAA Security The Risks of Relay Authentication Attacks What if we were to tell you that anyone connected to your network could simply…BOCadminSeptember 15, 2020
CybersecurityHIPAAHIPAA SecurityHIPAA Violations Media Marking When referencing the media marking requirement, media includes digital and physical media. Some examples are…Jordan KeatingSeptember 9, 2020
CybersecurityHIPAAHIPAA SecurityHIPAA Violations Media Sanitization Media can be found in scanners, copiers, printers, workstations, network components, and mobile devices! If you…Jordan KeatingSeptember 4, 2020
CybersecurityHIPAAHIPAA SecurityHIPAA Violations “Position Risk Designation: What it is and how it keeps onboarding consistent” If you’ve been involved with an organization’s security risk assessment you’ve probably heard “Position Risk…Jordan KeatingSeptember 1, 2020