Home » 2015 » April

Monthly Archives: April 2015

Your Guide to Conducting a HIPAA Risk Assessment

HIPAA states that a covered entity or business associate “must conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity and availability of electronic protected health information held by the covered entity or business associate.” This risk assessment requirement oft becomes a sticky issue for organizations subject to HIPAA. Why? Because covered entities and ...

Read More »

Your Guide to Cyber Disaster Recovery Planning

cyber disaster recovery planning

When it comes to cyber security, many organizations are inclined to promote best practices that focus on prevention. Compared to a “sit-and-wait,” reactive approach, where organizations shut down threats as they present themselves, tactical measures like continuous monitoring, threat intelligence and penetration testing are often more effective for stopping incidents. And with the Ponemon Institute placing the average cost of ...

Read More »

Surviving the FedRAMP After-Party

FedRAMP After Party

For cloud service providers, achieving FedRAMP accreditation is a major event worth celebrating. After navigating a sea of documentation, digging deep into your systems and hammering out the details of your security and privacy policies and procedures, you finally have what you need to do business with the federal government. It’s time to kick back and relax, right? Not quite. ...

Read More »