Blog

Pandemic and Business Continuity Planning – Where the Rubber Meets the Road

Blog
3 minutes
April 29, 2020
Learn more about business continuity planning in the face of the COVID-19 pandemic. The past few weeks have presented all of us with a great deal of operational challenges that ultimately brought us back to our current ...
Read Full Post

A Remote Workforce Risk Assessment is the First Step in Remote Work Security

Blog
6 minutes
April 15, 2020
Improve security of employees working from home with a risk assessment. Advances in technology have created opportunities for people to work away from the office. The benefits of remote working are well-documented in ...
Read Full Post

Transitioning to a Remote Workforce: Secure Remote Access

Blog
5 minutes
April 02, 2020
How to secure remote access workers during the COVID-19 outbreak and beyond. While the global spread of the COVID-19 coronavirus has caused many employees to work from home, the number of remote workers was growing ...
Read Full Post

Ransomware Prevention: What Measures Should You Take to Protect Your Information?

Blog
5 minutes
February 28, 2020
Many government and non-government entities have already been affected by ransomware attacks. Malicious software used by cybercriminals to encrypt important information from computers and hold it for ransom has ...
Read Full Post

Understanding the HIPAA Breach Notification Rule

Blog
4 minutes
June 06, 2019
What Entities Need to Understand About the HIPAA Breach Notification Rule With Electronic Health Records (EHR) becoming a healthcare industry standard, information security becomes highly critical to protect health ...
Read Full Post

Risk-Based Approach to Cyber and Information Security

Blog
4 minutes
April 16, 2019
Creating a cyber and information security program can appear to be a daunting task. Maybe you need to build one from scratch, or you already have some components in place and need to update your program so that it ...
Read Full Post

NCUA 2019 Supervisory Priorities – ACET and IT Risk Management

Blog
2 minutes
January 31, 2019
The first NCUA letter to credit unions of the new year, 19-CU-01, offers Supervisory Priorities for upcoming exams, including ACET and IT Risk Management. Among the focus items are enhanced Bank Secrecy Act Compliance ...
Read Full Post

Security Compliance Associates Achieves HITRUST CSF® Assessor Designation

Blog
2 minutes
January 31, 2019
Learn More About SCA’s HITRUST Assessor Designation Security Compliance Associates, a leading provider of cybersecurity assessment and advisory services, today announced that it has been designated as a HITRUST CSF ...
Read Full Post

7 Tips to Securing IoT (Internet of Things) Devices

Blog
5 minutes
December 15, 2018
When mobile phones were first introduced, if someone were to tell you that your mobile phone could be used to copy your fingerprints or steal passwords to your emails, you would have most likely laughed at them and told ...
Read Full Post

GLBA Compliance Requirements

Blog
4 minutes
November 20, 2018
The Gramm-Leach-Bliley Act which is also known as the Financial Modernization ACT OF 1999, is a United States federal law that requires all financial institutions to ensure the privacy and security of customer ...
Read Full Post

Subscribe