Blog

Alaska Breach Notification Law

Data Breach
3 minutes
October 25, 2019
Learn about Breach Notification Law in Alaska Alaska Stat. § 45.48.010 et seq., passed under H.B. 65 and signed into law on June 13, 2008, went into effect July 1, 2009. Specific information pertaining to Alaska breach ...
Read Full Post

Alabama Breach Notification Law

Data Breach
2 minutes
October 18, 2019
Breach Notification Guide in Alabama Alabama S.B. 318 was put into law March 28, 2018 and became effective June 1 that year. Breach laws for Alabama apply to individuals or commercial entities pertaining to sensitive ...
Read Full Post

Breach Notification Law in Florida

Data Breach
3 minutes
October 10, 2019
Learn more about the breach notification laws in the State of Florida. Florida Statute Codes for Breach Notification A security breach in Florida is defined as a breach of personal information stored in an electronic ...
Read Full Post

An Introduction to HITRUST®

HITRUST
8 minutes
June 07, 2019
Learn more about HITRUST® CSF Certification. If you have never heard of HITRUST, just starting to learn about HITRUST or actively involved in using HITRUST or searching for a qualified, trusted partner to facilitate ...
Read Full Post

Understanding the HIPAA Breach Notification Rule

Blog
4 minutes
June 06, 2019
What Entities Need to Understand About the HIPAA Breach Notification Rule With Electronic Health Records (EHR) becoming a healthcare industry standard, information security becomes highly critical to protect health ...
Read Full Post

Risk-Based Approach to Cyber and Information Security

Blog
4 minutes
April 16, 2019
Creating a cyber and information security program can appear to be a daunting task. Maybe you need to build one from scratch, or you already have some components in place and need to update your program so that it ...
Read Full Post

What to do After Experiencing a Data Breach

Data Breach
4 minutes
April 03, 2019
It’s Likely Your Business Will Experience A Data Breach When it comes to security issues related to technology, whether your business experiences a data breach is less a question of “if”, and more a question of “when”. ...
Read Full Post

NCUA 2019 Supervisory Priorities – ACET and IT Risk Management

Blog
2 minutes
January 31, 2019
The first NCUA letter to credit unions of the new year, 19-CU-01, offers Supervisory Priorities for upcoming exams, including ACET and IT Risk Management. Among the focus items are enhanced Bank Secrecy Act Compliance ...
Read Full Post

Security Compliance Associates Achieves HITRUST CSF® Assessor Designation

Blog
2 minutes
January 31, 2019
Learn More About SCA’s HITRUST Assessor Designation Security Compliance Associates, a leading provider of cybersecurity assessment and advisory services, today announced that it has been designated as a HITRUST CSF ...
Read Full Post

7 Tips to Securing IoT (Internet of Things) Devices

Blog
5 minutes
December 15, 2018
When mobile phones were first introduced, if someone were to tell you that your mobile phone could be used to copy your fingerprints or steal passwords to your emails, you would have most likely laughed at them and told ...
Read Full Post

Subscribe