When working toward HIPAA compliance, it is crucial to understand exactly what is considered PHI under HIPAA. PHI, or Protected Health Information, refers to any patient data that can be…
-
-
Years ago, businesses were relatively self-contained. The most important stakeholders were generally internal to a company, and strategic partners were fewer and more carefully chosen. Now, the globalized business environment…
-
Safeguarding data privacy is essential to becoming and remaining compliant with the GDPR. Using a GDPR privacy policy checklist, you can keep track of the types of data that require…
-
What is the NYDFS Cybersecurity Regulation? The NYDFS Cybersecurity Regulation – also referred to as 23 NYCRR 500 – is a set of regulations that are considered as cybersecurity best…
-
One of the most challenging aspects of compliance with the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is understanding how to store sensitive data. This is partly because…
-
Under the oversight of the SEC, FINRA protects investors in the United States by requiring broker-dealers to conduct fair financial market transactions. Compliance with the FINRA retention requirements helps broker-dealers…
-
To remain safe from cybersecurity threats, you must develop a comprehensive understanding of how these threats might unfold and eliminate as many exploitable risks as possible. One way to do…
-
If your organization must comply with several regulatory standards, it can be challenging to keep up with all of the requirements and remain compliant year-round. With the help of a…
-
Social engineering threats like phishing are common in today’s cybersecurity landscape. If unattended, these threats can develop into full-blown attacks that result in data breaches. So, what is a common…
-
Whether you have a small, medium, or large cybersecurity infrastructure, reducing its attack surface minimizes your risk of being compromised. Implementing attack surface management is critical to securing your assets,…