Blog

Cyber Incident Reporting on Critical Infrastructure 

Following SolarWinds & Colonial Hacks, security officials Introduced draft legislation on cyber incident reporting. Learn how it may affect your organization

Read more

#BeCyberSmart: Common Tips to Fight Against Phishing

One of the primary 2021 Cybersecurity Awareness Month’s focuses is resisting the phishing threat. Read how to fight against phishing and #BeCyberSmart!

Read more

Getting Ready for SOC 2 Audit: Where to Start?

SOC 2 is becoming a synonym for a reliable service provider. Learn how to prepare your organization for the SOC 2 audit and get a favorable audit opinion.

Read more

CCPA vs. CPRA: Upcoming Changes to the Law 

Discover what updates CPRA will bring to CCPA’s data privacy requirements and realize their implications for your organization. 

Read more

Ensuring Business Continuity at the Time of Disasters

Disasters may be detrimental to organizations that don’t have an emergency plan. Planet 9 advises on how to ensure continuity during a disaster. 

Read more

Data Security in Context of CCPA Compliance

CCPA grants Californian consumers privacy rights while imposing obligations on businesses. Learn how to meet these obligations and stay compliant.

Read more

Core Aspects of California Consumer Privacy Act (CCPA)

A detailed overview of the California Consumer Privacy Act (CCPA) and its requirements for data privacy. Learn how to work with consumers’ data in California. 

Read more

Unscrambling Confusion  Around CUI Protection Requirements

Protection of CUI requires a stable and complicated regulatory environment. Get a sense of the set of standards, requirements, and regulations around it. 

Read more

Digitalization in Healthcare: Opportunities and Challenges 

Digitalization has breathed new life into qualitative healthcare service delivery, yet the reverse side exists. Explore both the opportunities and challenges with Planet 9. 

Read more

Roadmap for Ransomware Protection  

General guidelines that would help your organization to prepare, prevent, and protect from potential ransomware incidents.

Read more

A Guide to Conducting NIST SP 800-171 Self-Assessments

All DoD contractors that work with CUI must perform a self-assessment for compliance with NIST SP 800-171. Learn what the assessment process entails.

Read more

NIST SP 800-171: Key Reasons for Maintaining the Standard

Non-federal contractors that handle CUI are bound to comply with NIST SP 800-171, as the Interim Rule requires. Learn more about why compliance matters.

Read more

Ransomware Hits Critical Infrastructure: a Case of Colonial

A simple explanation of why the ransomware attack on the Colonial Pipeline Company is such a big deal for the U.S. critical infrastructure

Read more

CMMC Compliance: a Guide for DoD Contractors

The Cybersecurity Maturity Model Certification (CMMC) for DoD Contractors is on the rise. Learn more about the CMMC framework and its compliance requirements.

Read more

HIPAA Compliance Evaluation for Responding to Security-Related Changes

HIPAA compliance requires a continuous and thorough evaluation of organizations’ capability to comply with the requirements and address changes. Learn how HIPAA Vitals may help.

Read more

Risk Assessment Under HIPAA Security Rule

A step-by-step risk assessment process for HIPAA Security Rule Compliance. Stay protected against risks and hazards to ePHI security.

Read more

HIPAA Security Rule: Implementing Safeguards to Protect ePHI

The HIPAA Security Rule requires administrative, physical, and technical safeguards for ePHI protection. Inquire about their implementation specifications.

Read more

Best Practices for Maintaining Data Security in Cloud

Maintaining data security in clouds is becoming more challenging. Discover how organizations’ best practices and security tools may help.

Read more

Shared Responsibility Model: Addressing Key Challenges to Cloud Security

The ongoing trend for cloud adoption exposes businesses to multiple cloud security challenges. Learn how the shared responsibility model can help.

Read more

HIPAA Compliance: Learning from Others’ Mistakes

Review general information about HIPAA Compliance and see consequences of non-compliance. 

Read more

Stay Safe from Cybercrime amid COVID-19 Vaccination and Tax Time

Forewarned is forearmed: learn about the common phishing schemes during the vaccination and tax time

Read more

HITRUST Certification: Maintaining Data Security and Compliance in Healthcare

Discover how HITRUST CSF aligns different compliance requirements and what the certification process entails

Read more

How to Conduct a Risk Assessment?

Learn about the main steps for conducting a risk assessment for protecting your data and staying compliant.

Read more

Answering Key Questions About Security Risk Assessments

Learn about the risk assessment and decide which methodology is the most suitable for you

Read more

General Insights into ISO 27001

Learn about the ISO 27001:2013 international certifiable standard and its significance for ISMS reliability

Read more

What is a SOC2 Audit and What are Its Benefits?

Learn about compliance challenges that induce companies to undergo SOC 2 audits and what SOC 2 is about.

Read more

What is GDPR Compliance and Why is it so Important?

The most important things you need to know to stay compliant with the General Data Protection Regulation and why it is so significant for individuals and businesses.

Read more

PCI DSS Compliance

According to MasterCard’s “The Global Journey From Cash to Cashless” article, the percentage of large cashless payments in the US is 80%. Learn about PCI-DSS compliance requirements.

Read more

CISO: A Must-Have for your company

Learn about what CISOs do, and why having one is important for every organization.

Read more

Phishing Emails Are On The Rise – How Can You Protect Yourself?

Have you received an email for an urgent money transfer from a friend who’s stranded in some other country?

Read more

Business Continuity in Light of Coronavirus Pandemic

The Coronavirus pandemic is not only impacting daily lives but is also changing the way businesses operate.

Read more