Blog

  • What Can You Do After a HITRUST Assessment Failed? Top Remediation Strategies

    What Can You Do After a HITRUST Assessment Failed? Top Remediation Strategies

    With more than 20 individual processes, requirements, and standards under its umbrella, the HITRUST Alliance provides a centralized set of guidelines for professionals in the healthcare industry and beyond. Unfortunately, because it incorporates so many frameworks, many entities who take a HITRUST assessment failed their initial or secondary attempts. Thankfully, there are plenty of remediation strategies available—including retaking the test—for those who have yet to pass. (more…)

  • CCPA Email Marketing Compliance Guide

    CCPA Email Marketing Compliance Guide

    Companies that market services or products to consumers in California must comply with CCPA email marketing guidelines to protect data privacy. Essentially, the CCPA protects the rights of consumers in California regarding the collection, use, or sale of personal data. Read on to learn more about CCPA email marketing compliance.
    (more…)

  • What is Information Technology Risk Management? Strategies and Best Practices

    What is Information Technology Risk Management? Strategies and Best Practices

    Given the current emphasis on digital recordkeeping, cloud computing, and online networking, a comprehensive information technology risk management plan is necessary. Organizations across all industries and activities benefit from adopting some common strategies and best practices. (more…)

  • What is Information Risk Management in Cybersecurity?

    What is Information Risk Management in Cybersecurity?

    Information risk management in cybersecurity is the process of deciding which information to protect and how to protect it. The process entails using various tools and techniques to identify, analyze, mitigate, and respond to the inherent data management risks of your organization. Each kind of risk in information security comes from different sources and drivers and can impact businesses differently, but these risks are often managed in the same basic ways.  (more…)

  • How to Build a Threat Assessment Model

    How to Build a Threat Assessment Model

    Increased cybersecurity threats such as ransomware, phishing, and DDoS attacks underscore a critical need for companies to invest in the appropriate cyber defenses to protect their digital assets. Building and optimizing a threat assessment model can help your company better understand the IT threat landscape and achieve the most efficient protection for your digital assets. (more…)

  • What is a Privacy Impact Assessment Tool for EU GDPR Compliance?

    What is a Privacy Impact Assessment Tool for EU GDPR Compliance?

    Privacy impact assessment tools serve multiple purposes in IT security. One is compliance with industry and location-based regulations. The EU’s General Data Protection Regulation (GDPR) exists to identify and minimize risks to personally identifiable information (PII) of EU citizens. It necessitates routine assessments from all entities that interact with EU citizens’ PII. A privacy impact assessment, tool-assisted or otherwise, is one way to ensure GDPR compliance. (more…)

  • What Does a Virtual CISO Do?

    What Does a Virtual CISO Do?

    Security program management presents the traditional Chief Information Security Officer (CISO) role with numerous challenges further complicated by the current proliferation of cyberthreats. As a C-level executive role, CISOs are primarily responsible for strategy and management. A CISO must oversee architecture implementation and maintenance, manage internal security teams, and assess and coordinate with vendors. But what does a virtual CISO do? (more…)

  • What is a HITRUST Validated Assessment, and Does Your Organization Need One?

    What is a HITRUST Validated Assessment, and Does Your Organization Need One?

    The HITRUST CSF can help organizations streamline compliance across multiple regulatory frameworks, address security gaps, and strengthen overall cybersecurity. Compliance with the HITRUST CSF may require your organization to complete a HITRUST Validated Assessment to verify adherence to HITRUST CSF controls. Read on to learn more. (more…)

  • What Exactly is a vCISO? How Outsourcing the CISO Role Can Optimize Cyberdefense ROI

    What Exactly is a vCISO? How Outsourcing the CISO Role Can Optimize Cyberdefense ROI

    With so many online threats, network vulnerabilities, and IT security gaps, the role of the chief information security officer (CISO) has never been more important. The role is in such high demand, however, that it can be difficult to source this executive-level individual without expanding your search to virtual candidates—be they individuals or third-party organizations.

    (more…)

  • SSL Security and PCI Compliance for eCommerce: Top Challenges and Considerations

    SSL Security and PCI Compliance for eCommerce: Top Challenges and Considerations

    eCommerce businesses that process large volumes of card payment transactions must protect the sensitive data involved. Strong SSL security and PCI compliance for eCommerce practices can minimize data breach risks and enhance your overall eCommerce cybersecurity. Read on to learn about the top challenges and considerations. (more…)