Blog

  • Governance, Risk and Compliance (GRC) Framework

    Governance, Risk and Compliance (GRC) Framework

    As your organization implements a governance, risk management, and compliance (GRC) cybersecurity approach, you might be wondering which tools or processes will streamline the process. One place to start is to implement a GRC framework. Read on to learn all about it! (more…)

  • Cloud Infrastructure Security in Healthcare

    Cloud Infrastructure Security in Healthcare

    The rise of cloud computing has transformed how industries manage data, and healthcare is no exception. From electronic medical records to telehealth platforms, cloud solutions now play a critical role in modern care delivery.

    However, with this advancement comes increased responsibility. Due to strict legal and regulatory requirements, organizations in or affiliated with healthcare must prioritize cloud security in healthcare, specifically by securing sensitive systems and protected health information (PHI).

    Ensuring robust cloud infrastructure security is essential to maintain compliance, protect patient data, and reduce cybersecurity risks.

    (more…)

  • The 4 Phases of Penetration Testing

    The 4 Phases of Penetration Testing

    Penetration testing is one of the most robust security testing tools within any cybersecurity program. When implemented effectively, the four phases of penetration testing will help identify gaps in your IT security and bolster your cyberdefenses. Read on to learn more about the penetration testing phases. (more…)

  • What are the ITIL Incident Management Best Practices?

    What are the ITIL Incident Management Best Practices?

    When it comes to the major incident management best practices, they’re best understood when you zoom out and look at the whole picture.The digitalization of the modern world has forced companies to reevaluate their security posture and how they respond to major incidents like network outages. 

    (more…)

  • Recap: RSI Virtual Summit (Webinar featuring Jscrambler)

    Recap: RSI Virtual Summit (Webinar featuring Jscrambler)

    RSI Security recently partnered with Jscrambler in an interactive Virtual Summit webinar. RSI Security’s Founder and Managing Director, John Shin, opened the event with a meditation on the importance of context and executing a power-move to go from context dependence to context awareness and agility—from needing context to recognizing it and operationalizing it. (more…)

  • How to Leverage MSSP Services for Cybersecurity and Compliance

    How to Leverage MSSP Services for Cybersecurity and Compliance

    Getting the most out of MSSP services means taking advantage of five unique benefits:

    • Top-line governance and advisory, including outsourced C-suite services
    • Assistance planning and building out robust cybersecurity infrastructure
    • Guided implementation across multiple regulatory frameworks’ controls
    • Comprehensive risk assessment and threat and vulnerability management
    • Streamlined assessments and certifications for regulatory compliance

    (more…)

  • What is QSA?

    What is QSA?

    Achieving PCI DSS compliance is critical for reducing the risk of data breaches, but the requirements can feel overwhelming especially for larger organizations. To ensure businesses meet all security standards set by the PCI Security Standards Council, many turn to a PCI QSA (Qualified Security Assessor). A PCI QSA is certified to evaluate security controls, identify gaps, and guide organizations through the compliance process with accuracy and efficiency.
    (more…)

  • How to Set Up a Secure Network: Back to Basics

    How to Set Up a Secure Network: Back to Basics

    Unauthorized access to your private data, eavesdropping and stealing are far too common due to your wireless connection not being secure enough. Setting up a secure network can be easy if you follow along.

    (more…)

  • Avoiding a Credit Card Data Breach

    Avoiding a Credit Card Data Breach

    The financial and reputational impact of a credit card data breach can be devastating. In 2017, the average cost of a breach reached $3.62 million, with over five million records stolen every day. To protect your business from becoming part of these costly statistics, it’s essential to understand where the risks lie.

    In this article, we’ll explore how credit card data breaches occur and outline practical steps your company can take to strengthen defenses and prevent them. (more…)

  • A Beginner’s Guide to Complying with HIPAA Regulations

    A Beginner’s Guide to Complying with HIPAA Regulations

    Complying with HIPAA regulations doesn’t have to be overwhelming. By following these four essential steps, organizations can ensure they meet federal requirements and protect sensitive patient data:

    1. Identify if Your Organization is a Covered Entity
      Determine whether your organization qualifies as a covered entity under HIPAA rules, including healthcare providers, health plans, or healthcare clearinghouses.
    2. Implement Required HIPAA Controls
      Apply administrative, physical, and technical safeguards to comply with HIPAA’s prescriptive rules and protect patient health information (PHI).
    3. Establish a Breach Notification Infrastructure
      Ensure you have processes and systems in place to detect, respond to, and report data breaches within the required HIPAA timelines.
    4. Streamline Compliance with a Unified Approach
      Integrate HIPAA compliance efforts across your organization to reduce duplication, maintain accountability, and simplify audits.

     

    (more…)