Recent Posts

CMMC
Posted in Checklist Compliance Program Risk Management Security News Security Program

Cybersecurity Maturity Model Certification (CMMC) – An Introduction

Are you a government contractor trying to find out what is the Cybersecurity Maturity Model Certification (CMMC), and how it will affect your company? The…

Continue Reading... Cybersecurity Maturity Model Certification (CMMC) – An Introduction
ryuk-ransomware
Posted in Best Practices Technology Risks

Ryuk Ransomware: 4 Best Prevention Tips for Corporate Users

It’s important for all of us to stay informed around the threats that exist in the ever-changing cybersecurity landscape. There is a new type of…

Continue Reading... Ryuk Ransomware: 4 Best Prevention Tips for Corporate Users
Posted in Risk Management Technology Risks

Is a HIPAA Risk Assessment Required Annually?

The HIPAA Security Rule specifically focuses on the safeguarding of ePHI and requires all HIPAA covered entities (CEs) and business associates (BAs) to ensure the…

Continue Reading... Is a HIPAA Risk Assessment Required Annually?
Posted in Best Practices Policies & Procedures

Breach Notification Policy for Healthcare Organizations and Business Associates

One of the provisions of the HITECH Act is the notification of individuals affected by a breach of their electronic protected health information. There are…

Continue Reading... Breach Notification Policy for Healthcare Organizations and Business Associates
5G Technology, Security Risks and Concerns
Posted in Technology Risks

5G Technology: Not So Fast! Security Risks and Concerns

Through the last decade, we have seen a humongous rise in technology and the use of mobile devices. At some point in the timeline, phones…

Continue Reading... 5G Technology: Not So Fast! Security Risks and Concerns
Exception Management Policy
Posted in Best Practices Compliance Program Policies & Procedures

Exception Management Policy – Best Practices

There may be times that business operations require certain exceptions be made to information security policies and procedures. This article provides some guidance and best…

Continue Reading... Exception Management Policy – Best Practices
personnel security policy
Posted in Best Practices Policies & Procedures

Personnel Security Policy – Best Practices

The purpose of the personnel security policy should be to establish controls on the hiring, training, and termination of all personnel (e.g. employees, contractors) to…

Continue Reading... Personnel Security Policy – Best Practices
Wireless Access Security Policy
Posted in Best Practices Checklist How-To Policies & Procedures

Wireless Access Security Policy – Best Practices

Wireless networks have become mainstream and are being widely deployed throughout many different environments; however, special considerations should be made in deploying a wireless network….

Continue Reading... Wireless Access Security Policy – Best Practices