Alaska Breach Notification Law
Learn about Breach Notification Law in Alaska Alaska Stat. § 45.48.010 et seq., passed under H.B. 65 and signed into law on June 13, 2008, went into effect July 1, 2009. Specific information pertaining to Alaska breach ...
Alabama Breach Notification Law
Breach Notification Guide in Alabama Alabama S.B. 318 was put into law March 28, 2018 and became effective June 1 that year. Breach laws for Alabama apply to individuals or commercial entities pertaining to sensitive ...
Breach Notification Law in Florida
Learn more about the breach notification laws in the State of Florida. Florida Statute Codes for Breach Notification A security breach in Florida is defined as a breach of personal information stored in an electronic ...
An Introduction to HITRUST®
Learn more about HITRUST® CSF Certification. If you have never heard of HITRUST, just starting to learn about HITRUST or actively involved in using HITRUST or searching for a qualified, trusted partner to facilitate ...
Understanding the HIPAA Breach Notification Rule
What Entities Need to Understand About the HIPAA Breach Notification Rule With Electronic Health Records (EHR) becoming a healthcare industry standard, information security becomes highly critical to protect health ...
Risk-Based Approach to Cyber and Information Security
Creating a cyber and information security program can appear to be a daunting task. Maybe you need to build one from scratch, or you already have some components in place and need to update your program so that it ...
What to do After Experiencing a Data Breach
It’s Likely Your Business Will Experience A Data Breach When it comes to security issues related to technology, whether your business experiences a data breach is less a question of “if”, and more a question of “when”. ...
NCUA 2019 Supervisory Priorities – ACET and IT Risk Management
The first NCUA letter to credit unions of the new year, 19-CU-01, offers Supervisory Priorities for upcoming exams, including ACET and IT Risk Management. Among the focus items are enhanced Bank Secrecy Act Compliance ...
Security Compliance Associates Achieves HITRUST CSF® Assessor Designation
Learn More About SCA’s HITRUST Assessor Designation Security Compliance Associates, a leading provider of cybersecurity assessment and advisory services, today announced that it has been designated as a HITRUST CSF ...
7 Tips to Securing IoT (Internet of Things) Devices
When mobile phones were first introduced, if someone were to tell you that your mobile phone could be used to copy your fingerprints or steal passwords to your emails, you would have most likely laughed at them and told ...