Blog

Part 1: Why You Need to Conduct SaaS Penetration Testing Now

Blog
7 minutes
June 27, 2024
In the modern business world, scalability is essential for growth. Doing so, without overextending one’s budget is a key component for that growth and, for that reason, the software as a service (SaaS) model has ...
Read Full Post

United Healthcare Data Breach: OCR’s Enhanced Focus on HIPAA Compliance and Cybersecurity

Blog
7 minutes
May 30, 2024
In the wake of the recent United Healthcare security breach, the U.S. Health and Human Services Office for Civil Rights (OCR) Director Melanie Fontes Rainer has highlighted the growing threat of ransomware cyberattacks, ...
Read Full Post

i1 – Implemented 1-Year HITRUST Assessment and Certification

Blog
8 minutes
April 30, 2024
In a recent blog post, we explored the HITRUST e1 Essentials 1-Year Assessment and Certification. It is the least stringent level of the three HITRUST assessment and certification options for organizations operating in ...
Read Full Post

Cybersecurity Challenges: AI, Ransomware and More

ESO Services
9 minutes
April 10, 2024
Cybersecurity is always challenging. There are so many moving parts, and everything is constantly changing. From artificial intelligence (AI) to ransomware, insider attacks, cloud attacks, IoT attacks, phishing attacks, ...
Read Full Post

FCI Vs. CUI: What is the Difference?

Blog
6 minutes
April 09, 2024
When it comes to safeguarding sensitive but unclassified information, a crucial distinction arises between Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). While both categories involve ...
Read Full Post

Virtual CISO Requirements: What to Look For

Blog
7 minutes
April 02, 2024
We hope you’ve been following this blog for a while. If that’s the case, you’ll know that the cybersecurity world is highly fast-paced regarding changing threats, security updates, and regulatory requirements. Depending ...
Read Full Post

CMMC Compliance Checklist: Preparing For Your Audit

Blog
9 minutes
March 15, 2024
Working with the government on contracts is extremely important for all involved, but that doesn’t mean there isn’t usually some red tape. Preparing for a Cybersecurity Maturity Model Certification (CMMC) audit has ...
Read Full Post

NIST Third Party Risk Management: Managing Supply Chain Risk

Blog
8 minutes
February 12, 2024
Cybersecurity relies heavily on established standards to fortify digital landscapes against evolving threats. Among the influential frameworks, the National Institute of Standards and Technology (NIST) standards are ...
Read Full Post

HITRUST E-1 Essentials: 1-Year Assessment and Certification

Blog
3 minutes
February 12, 2024
In a recent blog post, we outlined the relationship between HIPAA and HITRUST. In this post, as part of a series, we’ll help you understand the three assessment and certification options from HITRUST, starting with ...
Read Full Post

SCA and HITRUST at HIMSS: Creating Tomorrow’s Health

Blog
1 minutes
February 02, 2024
Build relationships with a dynamic community of healthcare professionals spanning the digital health landscape.
Read Full Post

Subscribe