Access Control Best Practices
Why is access control important? Without proper access control, unauthorized users could obtain confidential information and misuse it, and authorized users could fail to follow…
Antivirus Policy and Procedure Best Practices
The primary purpose of the anti-virus solution or software is to guard against malicious software or scripts by blocking or quarantining this software that is…
Mobile Device or BYOD Security Best Practices
This article will provide some guidance and best practices for the use of, and security for, remote access and mobile device technology (e.g. BYOD) that…
Teleworking Policy Guidance for Healthcare Organizations
The goal of this policy is to govern the controls and safeguards implemented for workforce members that are approved for teleworking activities. What should the…
Common Firewall Security Best Practices
Firewall security devices, including routers and Intrusion detection and/or prevention systems, play a critical role in system of controls to prevent and detect unauthorized access…
How To Prevent Application Vulnerabilities and Breaches
Any applications developed internally or outsourced should follow secure coding practices to prevent common vulnerabilities and potential data breaches. The application’s design and implementation should…
GDPR Explained In Plain English
What is the GDPR regulation and when did it passed? The EU General Data Protection Regulation, or GDPR for short, is a sweeping regulation passed…
Medical Device Security Best Practices
Medical devices improve health, quality of life, and even save lives. As such, medical device use must be appropriate for the context and setting in…