Using the HITRUST CSF Maturity Model

by Sarah Harvey / December 16, 2022

Organizations are often overwhelmed by the technical terminology and the number of requirements in the HITRUST CSF. However, while the HITRUST CSF may be daunting at first glance, the HITRUST CSF is not like any other framework. Achieving HITRUST CSF certification goes beyond showing whether or not you’re doing something, but instead it shows how well you’re doing it. In order to do this,  organizations are scored on how well…

What is Cybersecurity?

by Shannon Lane / October 11, 2023

What is cybersecurity, and why does it matter? The answer boils down to this: it’s a commitment to ensuring that the trust placed in your business by your clientele is warranted, understood, and treated as the precious commodity it is. It is a commitment to the understanding that you will do everything in your power to protect your clients from those who would do them harm, and that you will…

Not All Penetration Tests Are Created Equal

by Sarah Harvey / December 16, 2022

When you vet a company or an individual to perform penetration testing on your organization, what do you look for? Price, certifications, experience? Those are all important aspects, but you must also consider the quality of the penetration testing you will receive. All too often, we see organizations who pay for a penetration test and are expecting a thorough service receive a vulnerability scan labeled as a penetration test from…

GDPR Fundamentals: Data Security Requirements

by Mark Hinely / October 11, 2023

 Appropriate Data Security Controls While GDPR is primarily a data privacy law, it also includes elements of data security. But of course, GDPR is ambiguous so it’s not very prescriptive when it comes to data security requirements for processing personal data. The law requires each organization to evaluate its own data security based on risk, processing activities, and its organizational structure. By putting this in the hands of the…

How Mobile Devices Impact Protected Health Information

by Sarah Harvey / June 14, 2023

The use of mobile devices has absolutely transformed healthcare. Have you ever checked into a walk-in clinic on a tablet? Has a doctor shown you X-rays through a digital screen, rather than on film? Have you paid a medical bill through an app? Mobile devices are altering patient care. The need for mobility in healthcare settings is pervasive and the security threats that mobile devices pose are only going to…