To safeguard patient data security and privacy, organizations within and adjacent to healthcare must implement the Health Insurance Portability and Accountability Act (HIPAA) safeguards stipulated by the US Department of…
-
-
Limiting the points of entry in an environment to as few as possible reduces the number of points that can be targeted for attacks, making that environment easier to secure.…
-
Phishing emails come in many different varieties. Some are brief, one- or two-sentence messages, whereas others are longer and consist of text, digital images, and hyperlinks. Given the sheer variety…
-
When an attacker targets your organization’s data or assets, a single line of defense is unlikely to provide adequate protection. In fact, no single security tool or protocol can provide…
-
Ongoing security testing benefits your organization in many ways. Various methods are used for testing your cyberdefenses, but penetration testing remains one of the most popular. A specific form of…
-
Even with robust cyberdefenses, your network is still susceptible to hackers, social engineers, ransomware, and other digital hazards. Given the rapid development of technology, there are bound to be some…
-
The Payment Card Industry’s (PCI) Security Standards Council (SSC) requires companies who process card and electronic payments to maintain compliance with regulations that protect cardholder data. To demonstrate that they…
-
The HITRUST Alliance has helped streamline cybersecurity and compliance for companies across all industries since it was founded in 2007. It offers businesses the CSF—a unified regulatory framework that combines…
-
How Long Does It Take to Get HITRUST Certified? Timeline and Factors to Consider
by RSI Securityby RSI SecurityOrganizations that achieve HITRUST certification benefit from streamlined compliance across many industries. However, the timeline for HITRUST certification depends on organization readiness and several compliance considerations. Read on for a…
-
If you’re considering options for pen-testing tools, open-source and managed solutions are probably amongst your top choices. Of course, there are numerous pros and cons for each, and, in some…