ransomware-breach or incident only
It’s one of those questions that never goes away.  The answer is, “Maybe” and very definitely, “Not always.” Contrary to ...
Read More
perimeter security
Are you sure your medical records aren't accessible by outsiders? Maybe check your perimeter security. I'm not talking about fancy ...
Read More
Beware of Who You Hack
Isn’t it rewarding when a fellow security professional posts about an attempted hack of his personal website that he turned ...
Read More
BAA protect PHI
Ever run into a vendor who claims to be a conduit versus a business associate (BA)? It happens all too ...
Read More
CCPA HIPAA exemption
A brief recap: The California Consumer Privacy Act (CCPA) aims to give California consumers greater control over their personal information ...
Read More
alexa HIPAA health info privacy
By now you’ve likely heard that Amazon is moving into the HIPAA space with Alexa.  In conjunction with their partners, ...
Read More
CCPA Who Needs to Comply
The first thing to realize about California Consumer Privacy Act (CCPA) compliance is that you don’t have to be a ...
Read More
protect personal data privacy
Consumers on the warpath to protect personal data privacy are making strides in state houses. For instance, here's an update ...
Read More
How can your Third Party Vendor help or hurt your SOC 2 status?
Are you tracking the moving target of your third party vendors’ privacy and security practices? You may want to get ...
Read More
harden devices protect phi
When your goal is to protect PHI on laptops and mobile devices, keep in mind that information security is only ...
Read More
Loading...

Archives