Understanding physical penetration testing and how to take advantage of it requires: Knowing what physical pen tests are and the overall approach they take Appreciating how an actual physical penetration…
-
-
As organizations scale upward, their technological capacities grow exponentially—as do their cyberdefense needs. Hiring a C-suite executive to oversee all cybersecurity concerns is one approach, but a virtual solution is…
-
Organizations in and around healthcare can streamline risk assessments in five easy steps: Understanding which regulations apply (i.e., HIPAA, HITRUST, etc.) Scoping out what information and systems need to be…
-
Cybersecurity Risks Faced by Corporate Executives: Market Survey Report
by RSI Securityby RSI SecurityThe survey conducted independently by Ponemon Institute and published in May 2023, explores the significant cybersecurity risks faced by corporate executives in their personal digital lives. The report highlights the…
-
If your organization provides services to healthcare entities, such as IT support, cloud storage, billing, or legal services—you may be legally required to sign a HIPAA Business Associate Agreement (BAA).…
-
In 2008 the United States defense industry suffered a severe data loss. The resulting chaos galvanized the industry to create one of the most robust cybersecurity frameworks for business, government,…
-
Network security is continually becoming an area of tremendous focus for companies of all sizes. Whether you’re a corporation or a small-to-medium sized business (SMB), you’re a target for a…
-
The IT Infrastructure Library (ITIL) developed and released a series of agile incident management processes in the ITIL version 4. This most recent version discusses the 5 steps you should…
-
If your organization needs to comply with HIPAA, you’ll need to safeguard protected health information (PHI) and keep an eye out for: Identifiable records related to patients’ health conditions Identifiable…
-
As your organization implements a governance, risk management, and compliance (GRC) cybersecurity approach, you might be wondering which tools or processes will streamline the process. One place to start is…