fbpx

What is the difference between a vulnerability scan and a penetration test (pentest)?

What is a vulnerability scan? Vulnerabilities are flaws in software that can be exploited by hackers to gain access to your network or sensitive data including protected health information (PHI). Vulnerabilities can be in computer operating systems such as Microsoft Windows XP, 7, 8, 10 or Windows Server. They can...

Risk Analysis: What you need to know

You’ve likely heard of a risk analysis. Hopefully, you’ve also performed one for your organization. Whether you’ve been helping your organization work on its HIPAA compliance or dealing with financial regulations or government contracts, performing a risk analysis should be a high-priority item on your business’s to-do list. So, what...

What is Cyber Insurance?

What is the Standard for Cyber Insurance? Cyber insurance is a quickly-evolving product that is still fairly new. No standards exist, but here’s a list of coverages to consider when purchasing a policy: Data liability. This covers damages and defense costs resulting from any claim against the insured from a...

Why SMBs Fail After a Cyberattack

1.       Unable to afford IT staff With so many key entry points where a hacker can gain access to an organization’s data, it is critical that a proper IT team is in place. Not only is it important to have an IT team in place to implement the appropriate security measures,...

10 Cybersecurity Tips for Businesses

Is it that small businesses don’t care about cybersecurity? It wouldn’t be fair to make that assumption; however, small businesses do often overlook cybersecurity concerns. This could be the result of many different things. For example, small businesses often do not have the resources to dedicate to cybersecurity. In fact,...

Five Greatest Cybersecurity Threats to Businesses

E-mail Phishing Attacks: Those would be the fake e-mails that appear to come from a trusted source. They contain a malicious link or file attachment. The link may look identical to an authentic website to solicit your credentials or infect your network. The attachments will usually contain malware/viruses. Did you...

What is a Risk Assessment?

As a reminder, one of the most important aspects of complying with the HIPAA Security Rule is to perform a Security Risk Assessment (also known as a Security Risk Analysis) to evaluate how an organization is protecting patient data.  Every organization covered by HIPAA (Covered Entities and Business Associates) must perform an...

What triggers a HIPAA audit?

What is HIPAA? The Health Insurance Portability and Accountability Act, better know as HIPAA, was passed by Congress in 1996 and called for the protection and confidential handling of protected health information (PHI). HIPAA still exists today, aiming to protect patients and their information, but it’s important to think about...

What are the HIPAA standards for IT?

A HIPAA covered entity is more than just a doctor's office or hospital - its any business that comes in direct contact with a patient's PII (personally identifiable information). This includes not only medical providers but law firms dealing with medical cases, health insurance companies and medical billing services. HIPAA...