ransomware-breach or incident only

Are All Ransomware Attacks Breaches?

Array
It’s one of those questions that never goes away.  The answer is, “Maybe” and very definitely, “Not always.” Contrary to ...
Read More
perimeter security

Perimeter Security: It’s the Simple Things That’ll Get You

Array
Are you sure your medical records aren't accessible by outsiders? Maybe check your perimeter security. I'm not talking about fancy ...
Read More
Beware of Who You Hack

RFI Vulnerability Lesson: Beware of Who You (try to) Hack

Array
Isn’t it rewarding when a fellow security professional posts about an attempted hack of his personal website that he turned ...
Read More
BAA protect PHI

Business Associate or Conduit? Why a BAA likely applies to you.

Array
Ever run into a vendor who claims to be a conduit versus a business associate (BA)? It happens all too ...
Read More
CCPA HIPAA exemption

The CCPA and the Iffy Territory of the “HIPAA exemption”

Array
A brief recap: The California Consumer Privacy Act (CCPA) aims to give California consumers greater control over their personal information ...
Read More
alexa HIPAA health info privacy

Should you trust Alexa with your health information?

Array
By now you’ve likely heard that Amazon is moving into the HIPAA space with Alexa.  In conjunction with their partners, ...
Read More
CCPA Who Needs to Comply

Who needs to comply with the CCPA? Hint: Not only California.

Array
The first thing to realize about California Consumer Privacy Act (CCPA) compliance is that you don’t have to be a ...
Read More
protect personal data privacy

Consumers in the Regulatory Driver’s Seat: Protecting Personal Data Privacy

Array
Consumers on the warpath to protect personal data privacy are making strides in state houses. For instance, here's an update ...
Read More
How can your Third Party Vendor help or hurt your SOC 2 status?

How can your Third Party Vendor help or hurt your SOC 2 status?

Array
Are you tracking the moving target of your third party vendors’ privacy and security practices? You may want to get ...
Read More
harden devices protect phi

How to Harden Laptops, Tablets & Smartphones to Protect PHI

Array
When your goal is to protect PHI on laptops and mobile devices, keep in mind that information security is only ...
Read More
Loading...

Archives