CybersecurityHIPAAHIPAA SecurityHIPAA ViolationsPhishingRansomware Industry Best Practices To celebrate World Password Day we're sharing a post by our very own, Todd Skaggs,…Jordan KeatingMay 6, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacyRansomware The Ransomware Task Force is Calling for Action A group of about 60 executives from major organizations (including Microsoft, Citrix, Cisco, and Palo…Jordan KeatingMay 5, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA Violations Incident Response Training: Is Your Team Prepared? Having an Incident Response Plan is definitely a priority for any organization. Once you have an outline of…Jordan KeatingApril 30, 2021
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing Vulnerability Scans and Penetration Tests: What’s the Difference? We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…Jordan KeatingApril 27, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy HIPAA’s Right of Access Initiative Isn’t Slowing Down We have been following the OCR’s and HHS’ Right of Access Initiative over the past…Jordan KeatingApril 20, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPrivacy 21st Century Cures Act Final Rule Goes Into Effect In effect as of this week, April 5th, The Cures Act Final Rule implements some…Jordan KeatingApril 7, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA Violations Security Awareness Training: What Should You be Covering? All information system users in an organization need Security Awareness Training. Security Awareness Training should include training for…Jordan KeatingMarch 31, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA Violations Adopt a Clean-Desk Policy In a busy environment it can be very easy for staff to let clutter build…Jordan KeatingMarch 26, 2021
CybersecurityHIPAAHIPAA Privacy ComplianceHIPAA SecurityHIPAA ViolationsPhishingPrivacyRansomware End User Phishing Reminder! Take time to remind your end users on what to look for in phishing attempts!…Jordan KeatingMarch 23, 2021
CybersecurityHIPAAHIPAA SecurityHIPAA Violations Mobile Device Best Practices Many organizations allow employees to use mobile devices for everything from email to logging patient…Jordan KeatingMarch 16, 2021