Blog

  • How to Optimize Data Encryption in Healthcare

    How to Optimize Data Encryption in Healthcare

    Encrypting personal and personally identifiable information (PII) is critical for organizations in industries prone to cybersecurity threats, such as healthcare. Data encryption in healthcare is one essential part of compliance with regulatory frameworks such as HIPAA and HITRUST CSF, and it can be optimized by following some cutting-edge best practices. Read on to learn more. (more…)

  • Recap: Surviving a Cyber Attack: An Insider’s Perspective

    Recap: Surviving a Cyber Attack: An Insider’s Perspective

    With increased news reports of high-profile attacks, what can you learn from cyberattacks and protect your business? RSI Security teamed up with Bernard Global, a security consulting and advisory firm, to address best practices for cyberattack preparedness.  (more…)

  • Webinar Recap: Darktrace Workshop

    Webinar Recap: Darktrace Workshop

    RSI Security partnered with Darktrace to host a workshop on the cybersecurity applications and benefits of Darktrace’s threat hunting AI technology. Eileen opened by introducing the panelists: (more…)

  • Recap: Rethinking Your Cybersecurity ROI Before a Breach Occurs

    Recap: Rethinking Your Cybersecurity ROI Before a Breach Occurs

    With ransomware attacks increasing, healthcare organizations must determine how to frame and increase their ROI on cybersecurity. As a result, there is a need for tools and techniques to streamline security, mitigate risks, and prevent data breaches. RSI Security partnered with Darktrace, a British American cyber defense company, to rethink cybersecurity ROI, especially detecting and mitigating ransomware. (more…)

  • Why Do You Need SOC 2? A Guide for SaaS Providers

    Why Do You Need SOC 2? A Guide for SaaS Providers

    Why do you need SOC 2 for providing SaaS services? SOC reports and audits can help service organizations assure clients and customers of robust, secure internal controls for managing outsourced services and associated data. Read on to learn how SOC 2 compliance can help you build trust assurance for your clients. (more…)

  • Top Four Advanced Penetration Testing Tactics

    Top Four Advanced Penetration Testing Tactics

    The threat of cyberattacks is growing both in complexity and frequency, prompting many organizations to adopt a preventive approach to cyberdefense. Penetration testing provides your security personnel deep analytics on how attackers may target your systems, which empowers you to build commensurate protections. With the most advanced penetration testing techniques, you can optimize your security proactively rather than reactively. (more…)

  • How to Meet the CCPA Requirements for Enterprise Privacy Risk Assessment?

    How to Meet the CCPA Requirements for Enterprise Privacy Risk Assessment?

    The California Consumer Protection Act (CCPA) was created to respect and protect consumer data. It ensures certain rights—like the right to opt-out of data collection programs—and it introduces numerous disclosure, privacy policy, and enterprise privacy risk assessment requirements that organizations must follow. (more…)

  • What Are the HITRUST Encryption Requirements?

    What Are the HITRUST Encryption Requirements?

    Founded in 2007, HITRUST initially provided a comprehensive framework for safeguarding protected health information (PHI) and electronic health records (EHR) in the medical industry. Since then, the HITRUST CSF has expanded to include the most widely applicable compliance requirements across numerous industries and organizational activities. Although there aren’t any specific HITRUST encryption requirements, some of the standards it includes—specifically, HIPAA—do require encryption. (more…)

  • Who Needs CMMC Certification? Do You Need It?

    Who Needs CMMC Certification? Do You Need It?

    In November 2021, the U.S. Department of Defense (DoD) introduced major updates to the Cybersecurity Maturity Model Certification(CMMC) program. These changes left many organizations in the Defense Industrial Base (DIB) wondering: Do we still need to comply with CMMC certification requirements?

    The short answer is yes, but the more important question is which Level of CMMC certification applies to your organization. The required Level depends on the type of sensitive data you handle in your current or prospective DoD contracts. Understanding this distinction is critical, as it determines the cybersecurity controls you must implement—and how soon you need to meet them. (more…)

  • Top Enterprise Security Monitoring Tools

    Top Enterprise Security Monitoring Tools

    Enterprise security monitoring involves strengthening your organization’s cyberdefenses in a holistic and integrated approach. Your cybersecurity strategy should account for varied threats from all potential attack vectors. When crafting a robust program, you have limitless security monitoring tools to choose from. Therefore, and due to the complex nature of security solutions available today, it helps to identify the top enterprise security monitoring tools that will collectively protect your organization against rapidly evolving threats.  (more…)