Recent Posts
Cybersecurity Maturity Model Certification (CMMC) – An Introduction
Are you a government contractor trying to find out what is the Cybersecurity Maturity Model Certification (CMMC), and how it will affect your company? The…
Ryuk Ransomware: 4 Best Prevention Tips for Corporate Users
It’s important for all of us to stay informed around the threats that exist in the ever-changing cybersecurity landscape. There is a new type of…
Is a HIPAA Risk Assessment Required Annually?
The HIPAA Security Rule specifically focuses on the safeguarding of ePHI and requires all HIPAA covered entities (CEs) and business associates (BAs) to ensure the…
Breach Notification Policy for Healthcare Organizations and Business Associates
One of the provisions of the HITECH Act is the notification of individuals affected by a breach of their electronic protected health information. There are…
5G Technology: Not So Fast! Security Risks and Concerns
Through the last decade, we have seen a humongous rise in technology and the use of mobile devices. At some point in the timeline, phones…
Exception Management Policy – Best Practices
There may be times that business operations require certain exceptions be made to information security policies and procedures. This article provides some guidance and best…
Personnel Security Policy – Best Practices
The purpose of the personnel security policy should be to establish controls on the hiring, training, and termination of all personnel (e.g. employees, contractors) to…
Wireless Access Security Policy – Best Practices
Wireless networks have become mainstream and are being widely deployed throughout many different environments; however, special considerations should be made in deploying a wireless network….