Blog

A Guide to Conducting NIST SP 800-171 Self-Assessments

All DoD contractors that work with CUI must perform a self-assessment for compliance with NIST SP 800-171. Learn what the assessment process entails.

Read more

NIST SP 800-171: Key Reasons for Maintaining the Standard

Non-federal contractors that handle CUI are bound to comply with NIST SP 800-171, as the Interim Rule requires. Learn more about why compliance matters.

Read more

Ransomware Hits Critical Infrastructure: a Case of Colonial

A simple explanation of why the ransomware attack on the Colonial Pipeline Company is such a big deal for the U.S. critical infrastructure

Read more

CMMC Compliance: a Guide for DoD Contractors

The Cybersecurity Maturity Model Certification (CMMC) for DoD Contractors is on the rise. Learn more about the CMMC framework and its compliance requirements.

Read more

HIPAA Compliance Evaluation for Responding to Security-Related Changes

HIPAA compliance requires a continuous and thorough evaluation of organizations’ capability to comply with the requirements and address changes. Learn how HIPAA Vitals may help.

Read more

Risk Assessment Under HIPAA Security Rule

A step-by-step risk assessment process for HIPAA Security Rule Compliance. Stay protected against risks and hazards to ePHI security.

Read more

HIPAA Security Rule: Implementing Safeguards to Protect ePHI

The HIPAA Security Rule requires administrative, physical, and technical safeguards for ePHI protection. Inquire about their implementation specifications.

Read more

Best Practices for Maintaining Data Security in Cloud

Maintaining data security in clouds is becoming more challenging. Discover how organizations’ best practices and security tools may help.

Read more

Shared Responsibility Model: Addressing Key Challenges to Cloud Security

The ongoing trend for cloud adoption exposes businesses to multiple cloud security challenges. Learn how the shared responsibility model can help.

Read more

HIPAA Compliance: Learning from Others’ Mistakes

Review general information about HIPAA Compliance and see consequences of non-compliance. 

Read more

Stay Safe from Cybercrime amid COVID-19 Vaccination and Tax Time

Forewarned is forearmed: learn about the common phishing schemes during the vaccination and tax time

Read more

HITRUST Certification: Maintaining Data Security and Compliance in Healthcare

Discover how HITRUST CSF aligns different compliance requirements and what the certification process entails

Read more

How to Conduct a Risk Assessment?

Learn about the main steps for conducting a risk assessment for protecting your data and staying compliant.

Read more

Answering Key Questions About Security Risk Assessments

Learn about the risk assessment and decide which methodology is the most suitable for you

Read more

General Insights into ISO 27001

Learn about the ISO 27001:2013 international certifiable standard and its significance for ISMS reliability

Read more

What is a SOC2 Audit and What are Its Benefits?

Learn about compliance challenges that induce companies to undergo SOC 2 audits and what SOC 2 is about.

Read more

What is GDPR Compliance and Why is it so Important?

The most important things you need to know to stay compliant with the General Data Protection Regulation and why it is so significant for individuals and businesses.

Read more

PCI DSS Compliance

According to MasterCard’s “The Global Journey From Cash to Cashless” article, the percentage of large cashless payments in the US is 80%. Learn about PCI-DSS compliance requirements.

Read more

CISO: A Must-Have for your company

Learn about what CISOs do, and why having one is important for every organization.

Read more

Phishing Emails Are On The Rise – How Can You Protect Yourself?

Have you received an email for an urgent money transfer from a friend who’s stranded in some other country?

Read more