Blog

  • HITRUST: Beyond Healthcare Compliance Management Software

    HITRUST: Beyond Healthcare Compliance Management Software

    Organizations trying to manage healthcare compliance can look to the healthcare compliance management software and frameworks offered by the HITRUST Alliance. Compliance with HITRUST CSF will strengthen your entire IT infrastructure and protect you from cybersecurity threats common to the healthcare industry and beyond. Read on to learn more. (more…)

  • How to Find HITRUST External Assessors

    How to Find HITRUST External Assessors

    When preparing for HITRUST certification, organizations rely on HITRUST external assessors for compliance assessments and vulnerability remediation guidance. It is critical that you find a HITRUST certification partner that helps meet your compliance and security needs. Read our guide to learn how and where to find HITRUST external assessors. (more…)

  • Top 3 Identity Access Management Solutions

    Top 3 Identity Access Management Solutions

    Identity access management solutions are critical to keeping cybercriminals out of your cybersecurity architecture and safeguarding sensitive data. Implementing tools and processes to authenticate access to digital assets will help mitigate data breaches. Read on to learn more about the top identity access management solutions. (more…)

  • How to Execute the Containment Phase of Incident Response

    How to Execute the Containment Phase of Incident Response

    A robust incident response program is critical to managing cybersecurity incidents and mitigating potential damage to sensitive data and digital assets. The containment phase of incident response helps prevent the spread of threats from one area of your IT infrastructure to another. Read on to learn more about best practices for incident containment. (more…)

  • Health Compliance Pros and Cons: HITRUST Certification vs. Others

    Health Compliance Pros and Cons: HITRUST Certification vs. Others

    For organizations within and adjacent to healthcare, compliance with regulatory frameworks such as HITRUST helps strengthen the privacy and security of sensitive patient data. However, healthcare compliance has pros and cons, depending on your business environment, security needs, or organizational structure. Read on to learn more about healthcare compliance pros and cons and how to ensure seamless compliance with efficient and powerful cybersecurity.

    (more…)

  • HIMSS ’22: Event Recap

    HIMSS ’22: Event Recap

    The team here at RSI Security is elated to have attended the 2022 Healthcare Information and Management Systems Society (HIMSS) conference. HIMSS ‘22 took place in Orlando, Florida, on March 14th-18th. Our team attended eye-opening events daily, sun-up to sun-down, and met with some of the most brilliant Chief Information Security Officers (CISOs) and other security professionals working in and around the healthcare industry. Read on for a recap of the event. (more…)

  • GDPR vs HIPAA Compliance: What are the Differences & Similarities?

    GDPR vs HIPAA Compliance: What are the Differences & Similarities?

    Recent cyberattacks in the healthcare industry underscore the need for organizations to safeguard data privacy and sensitivity via HIPAA compliance. Likewise, privacy stipulations—such as those in the EU GDPR—can help businesses protect their customers’ data privacy. Read on for a comparison of GDPR vs HIPAA to learn about the differences and similarities between both frameworks. (more…)

  • SOC 2 vs SOC 3: What is the Difference?

    SOC 2 vs SOC 3: What is the Difference?

    Service organizations looking to build out secure IT infrastructure can rely on SOC reports to audit their security controls. Besides strengthening and optimizing your security posture, SOC compliance also provides security assurance to your stakeholders. Read our guide to learn more about SOC reports, especially SOC 2 vs SOC 3, and how they can help you.  (more…)

  • What Is a NIST 800-171 Passing Score?

    What Is a NIST 800-171 Passing Score?

    Compliance with the National Insitute of Standards and Technology (NIST) Special Publication 800-171 is critical to demonstrating your security posture as a Department of Defense (DoD) contractor—helping you maintain preferred contractor status. NIST 800-171 compliance helps safeguard sensitive information such as Covered Defense Information (CDI) and Controlled Unclassified Information (CUI). Read on to learn all about NIST 800-171 passing scores. (more…)

  • Your Guide to Incident Response Testing and Exercises

    Your Guide to Incident Response Testing and Exercises

    Incident response testing is critical to bolstering an organization’s cyberdefenses against potential threats. By implementing incident response plan testing, you can be better prepared to handle various types of threats, secure sensitive data, and minimize disruptions to business continuity. Read on to learn more about incident response testing and exercises. (more…)