7 Steps to a HIPAA-Compliant Risk Analysis

Posted by & filed under List Posts.

HIPAA risk analysis - steps to achieve - doctor on laptop

As you consider your risk analysis and efforts to keep it HIPAA-compliant, it is helpful to understand that the notion of risk is inherently context-based. Whenever you think about risk, initial questions to ask yourself are: What asset am I attempting to protect? What are potential threats? What must be defended? How substantial is the… Read more »

How the IT Threat Landscape Will Change in 2018

Posted by & filed under List Posts.

How the IT Threat Landscape Will Change in 2018

In late 2016, Forrester forecast that automation and security services would be used increasingly to meet a shortage of tech talent, that greater than half a million IoT devices would be hacked, that compromises of healthcare systems would become as extensive and prevalent as previous ones within retail, and that a significant IT security breach… Read more »