The team here at RSI Security is elated to have attended the 2022 Healthcare Information and Management Systems Society (HIMSS) conference. HIMSS ‘22 took place in Orlando, Florida, on March 14th-18th. Our team attended eye-opening events daily, sun-up to sun-down, and met with some of the most brilliant Chief Information Security Officers (CISOs) and other security professionals working in and around the healthcare industry. Read on for a recap of the event. (more…)
Blog
-

GDPR vs HIPAA Compliance: What are the Differences & Similarities?
Recent cyberattacks in the healthcare industry underscore the need for organizations to safeguard data privacy and sensitivity via HIPAA compliance. Likewise, privacy stipulations—such as those in the EU GDPR—can help businesses protect their customers’ data privacy. Read on for a comparison of GDPR vs HIPAA to learn about the differences and similarities between both frameworks. (more…)
-

SOC 2 vs SOC 3: What is the Difference?
Service organizations looking to build out secure IT infrastructure can rely on SOC reports to audit their security controls. Besides strengthening and optimizing your security posture, SOC compliance also provides security assurance to your stakeholders. Read our guide to learn more about SOC reports, especially SOC 2 vs SOC 3, and how they can help you. (more…)
-

What Is a NIST 800-171 Passing Score?
Compliance with the National Insitute of Standards and Technology (NIST) Special Publication 800-171 is critical to demonstrating your security posture as a Department of Defense (DoD) contractor—helping you maintain preferred contractor status. NIST 800-171 compliance helps safeguard sensitive information such as Covered Defense Information (CDI) and Controlled Unclassified Information (CUI). Read on to learn all about NIST 800-171 passing scores. (more…)
-

Your Guide to Incident Response Testing and Exercises
Incident response testing is critical to bolstering an organization’s cyberdefenses against potential threats. By implementing incident response plan testing, you can be better prepared to handle various types of threats, secure sensitive data, and minimize disruptions to business continuity. Read on to learn more about incident response testing and exercises. (more…)
-

Your Guide to Writing Technical Documentation
Communication is essential to the operations and success of any organization; documentation is one of the primary tools in preserving and communicating technical information. Technical documentation is used to educate personnel, record processes and policies, and report the results of audits and assessments. This technical writing 101 will examine best practices of writing technical documentation and the ways it can benefit your organization’s cybersecurity. (more…)
-

How Does Internal Audit Management Work?
Proper internal audit management is essential to ensuring that necessary assessments are performed regularly and provide accurate results. Confirming adherence to policy and conformance with compliance standards requires an impartial evaluation, which is why audits are needed in addition to routine security assessments. This guide will clarify the role of the internal audit function, the purposes of the internal audit, and how proper management of the process contributes to organizational security. (more…)
-

How to Conduct a Threat Vulnerability Assessment in Four Steps
Safeguarding your digital assets against potential cyberattacks depends on how well you can identify and mitigate potential cybersecurity threats. It all starts with learning how to conduct a threat vulnerability assessment, which—if implemented effectively—will optimize your cybersecurity posture and help boost your cyber defenses. Read on to learn more. (more…)
-

PCI Compliance Key Management Requirements
If your organization processes, transmits, or stores card payment data, following the PCI key management requirements is essential to protect sensitive cardholder information. These PCI DSS guidelines provide best practices for generating, storing, distributing, and retiring encryption keys, ensuring that card payment data remains secure.
Read on to learn how your organization can implement effective key management strategies to maintain PCI compliance and reduce the risk of data breaches.
-

The Best Types of Cyber Security Solutions for Healthcare Organizations
In light of recent cyberattacks in healthcare, organizations within and adjacent to healthcare must utilize robust types of cybersecurity solutions to mitigate data breaches. Protected health information (PHI) is a highly sensitive class of data that must be secured by proactive and reactive cybersecurity solutions to safeguard its sensitivity and privacy. Read on to learn more. (more…)
