Ensure your organization has the proper processes, tools and people in place to reduce the likelihood of successful attacks.
Ten ways to maximize privilege for cybersecurity forensic reports to keep your reports protected.
An inside look at what happened with SolarWinds and how to protect yourself when the unexpected comes calling.
A brief overview of U.S. privacy laws that give protections to individuals regarding the collection, use, and disclosure of personal information by both the public and private sectors.
How a bad actor group affected the legal implications of cracking hashed passwords, and what SHA-256 is.
Vulnerabilities introduced by third-party vendors account for about two-thirds of all data breaches.
On January 5, 2021, the HR 7898 - HIPAA Safe Harbor Bill, was signed into law, which amends the Health Information Technology for Economic and Clinical Health (HITECH) Act.
On November 17, 2020, the Securities and Exchange Commission (SEC) voted to allow e-signatures, subject to certain prerequisites, on documents filed with the SEC via the Electronic Data Gathering, Analysis, and Retrieval system.
Tips and recommendations to inform your defense against this most troubling form of malware.
Training end users to be vigilant against cyber-attacks is the first step towards keeping your organization secure.
This post highlights some of the common technology that bad actors may use against systems to orchestrate attacks.
Last year’s notorious malware masterminds are at it again.
Agio Healthcare's Managing Director of Cybersecurity offers his take on this year’s report.
Pursuing a HITRUST certification might free up key resources to accelerate your business.
Discover why our clients are finding value in our HITRUST Advisory Partnership now more than ever.