7 Steps to a HIPAA-Compliant Risk Analysis

Posted by & filed under List Posts.

HIPAA risk analysis - steps to achieve - doctor on laptop

As you consider your risk analysis and efforts to keep it HIPAA-compliant, it is helpful to understand that the notion of risk is inherently context-based. Whenever you think about risk, initial questions to ask yourself are: What asset am I attempting to protect? What are potential threats? What must be defended? How substantial is the… Read more »

GDPR Has Launched – 7 Steps to Compliance

Posted by & filed under List Posts.

Juggling security to protect sensitive customer data - GDPR compliance steps - General Data Protection Regulation

While there are borders between nations, the world is integrally connected. That is perhaps nowhere more evident than in the marketplace of the Internet. The interconnection that the Web allows also means that security is a huge priority, since no one wants anyone who is unauthorized accessing their confidential data. Sometimes legislation will be passed… Read more »

How the IT Threat Landscape Will Change in 2018

Posted by & filed under List Posts.

How the IT Threat Landscape Will Change in 2018

In late 2016, Forrester forecast that automation and security services would be used increasingly to meet a shortage of tech talent, that greater than half a million IoT devices would be hacked, that compromises of healthcare systems would become as extensive and prevalent as previous ones within retail, and that a significant IT security breach… Read more »