RSI Security hosted a webinar with Mueller to discuss the types, purposes, and benefits of SOC 2 reports. Panelists discussed aspects of SOC 2 audits, risk management, and assessment of…
-
-
What Can You Do After a HITRUST Assessment Failed? Top Remediation Strategies
by RSI Securityby RSI SecurityWith more than 20 individual processes, requirements, and standards under its umbrella, the HITRUST Alliance provides a centralized set of guidelines for professionals in the healthcare industry and beyond. Unfortunately,…
-
Comprehensive PCI Compliance Checklist 2021 (With Expected Updates for PCI DSS v4.0)
by RSI Securityby RSI SecurityWith so much reliance on digital payment processing, a standardized set of rules, guidelines, and policies for securing data is critical. Established by the Payment Card Industry (PCI), the Data…
-
HIPAA is the preeminent regulatory standard governing the use and transmission of confidential patient information. Nearly every single entity involved in the healthcare industry—directly or tangentially—needs to comply with the…
-
Data security is paramount when accepting payments through credit & debit cards and payment processing software. Any organization processing, storing, or sharing cardholder data (CHD) is mandated to abide by…
-
Companies that market services or products to consumers in California must comply with CCPA email marketing guidelines to protect data privacy. Essentially, the CCPA protects the rights of consumers in…
-
Although modern cyberattacks are growing in voracity and sophistication, some of the most effective methods still rely on traditional techniques. The “man in the middle attack”—also known as the “monster-in-the-middle,”…
-
What is Information Technology Risk Management? Strategies and Best Practices
by RSI Securityby RSI SecurityGiven the current emphasis on digital recordkeeping, cloud computing, and online networking, a comprehensive information technology risk management plan is necessary. Organizations across all industries and activities benefit from adopting…
-
The Payment Card Industry Security Standards Council (PCI SSC) requires all organizations that collect, process, store, or transmit card payments to comply with security frameworks—of which the most widely applicable…
-
Information risk management in cybersecurity is the process of deciding which information to protect and how to protect it. The process entails using various tools and techniques to identify, analyze,…