Road to HIPAA Compliance: Managing Business Associate Compliance

by KirkpatrickPrice / December 19, 2022

Why Does Business Associate Compliance Matter? The goal for this session is to identify the importance of the relations between covered entities and business associates, and to identify the issues that business associates and covered entities must navigate. This webinar is not designed just to benefit the covered entities. If you are a business associate, it will be beneficial to learn the issues that covered entities are dealing with and…

Understanding Data Breaches with Benjamin Wright

by Benjamin Wright / December 19, 2022

It’s become quite common to see reports in the headlines about data security breaches as different types of organizations are targeted every day. The types of information or data that is stolen as a result of a breach are things like social security numbers, credit card numbers, Protected Health Information (PHI), and Personally Identifiable Information (PII), trade secrets, or intellectual property. The most important thing to consider when it comes…

Man working on computer

Assessing Your Defenses: Penetration Testing for Beginners

by Sarah Harvey / December 19, 2022

What is Penetration Testing? Penetration testing is a form of permission-based ethical hacking in which a certified penetration tester attempts to gain access to an organization's system, network, or web application(s). The purpose of penetration testing is to find vulnerabilities that could potentially be exploited by a malicious hacker as part of a routine security check. This form of security testing allows organizations to find the vulnerabilities in their security…

5 Benefits of Regular Penetration Tests

by Sarah Harvey / June 22, 2023

Undergoing regular penetration testing is key to your overall security posture. It’s an important practice that gives organizations visibility into real-world threats to your security. As part of a routine security check, penetration tests allow you to find the gaps in your security before a hacker does by exploiting vulnerabilities and providing steps for remediation. The pros of having regular penetration tests performed far outweigh the cons. Here are the…

PCI Readiness Series: PCI Requirement 10

by KirkpatrickPrice / December 19, 2022

PCI Requirement 10: Tracking and Monitoring All Access to Network Resources and Cardholder Data This session in our PCI Readiness series spotlights PCI Requirement 10, which examines the tracking and monitoring of all access to network resources and cardholder data. Our panelist for this session, Jeff Wilder, explains each part of PCI Requirement 10 in detail, along with some of the common struggles that come along with this requirement.  Complying…