The HITRUST Common Security Framework, or HITRUST CSF, is a global, certifiable framework developed to aid organizations’ regulatory compliance efforts. In 2020, HITRUST CSF v9. 4 introduced several updates specific…
-
-
What Should Security Awareness Training Include for Healthcare Companies?
by RSI Securityby RSI SecuritySecurity awareness involves everyone in your company—from clerical and administrative staff to doctors, nurses, IT staff, and even your patients. Everyone plays an important role. Unfortunately, this often leaves organizational…
-
The HITRUST Approach covers four key strategies to achieve your information security risk management and compliance goals: “Identify & Define,” “Specify,” “Implement & Manage,” and “Assess & Report.” Corrective action…
-
Traditionally, social engineering is a trick often used by conmen, thieves, and other malicious actors. Designed to catch the victim off-guard and unaware, primarily for the actor’s personal gain, much…
-
Compliance with the Payment Card Industry (PCI) Data Security Standards (DSS) is required for all merchants that collect, store, process, or transmit credit card data. The PCI Security Standards Council…
-
Webinar Recap: How To Prepare Your Business for the Future of Data Privacy
by RSI Securityby RSI SecurityRSI Security recently partnered with Trustifi to discuss some significant considerations for the future of data privacy and security. Panelists discussed companies’ pain points concerning various, overlapping compliance frameworks and…
-
Service organizations vary widely in nature, but all need to assure their clients’ trust. One significant hurdle to that effect is securing the networks upon which you and your customers…
-
One of the most comprehensive cybersecurity frameworks companies can implement is the HITRUST Alliance’s CSF. Full certification has many benefits, including streamlined compliance across other regulations and optimal security. Conducting…
-
Encryption protects data by rendering it unreadable without the associated key. Thus, encrypted hard drives secure the entirety of data stored on a given device. While not a substitute for…
-
If your organization conducts business via web applications, it’s critical to protect your web application infrastructure from threats such as denial-of-service (DDoS) attacks, malware, and ransomware. With increased web traffic…