Alex Thompson

Real cyber risk profile

Do you know your real cyber risk?

If you’re like most companies, you’ve got cyber liability insurance, and if you took your agent’s advice, it’s probably higher than the minimum. So you’re covered, right? Wrong. One way to determine your risk profile is to build it up from a baseline of zero. For example, you have a database of 20,000 clients/patients. You …

Do you know your real cyber risk? Read More »

NIST CSF guidance on cybersecurity

Getting your cybersecurity right can be as easy as CSF!

The NIST Cybersecurity Framework (CSF) is a voluntary set of guidelines and best practices designed to help organizations manage and reduce cybersecurity risks. The CSF provides a framework for organizations to identify, assess, and manage cybersecurity risks in a way that aligns with their business needs and objectives. The CSF consists of five core functions: …

Getting your cybersecurity right can be as easy as CSF! Read More »

I.T. Literate Employees

The Importance of IT Literacy: How Employee Negligence Contributes to Cyber Security Breaches

In today’s world, information technology (IT) literacy has become a basic necessity for employees in almost every industry. As businesses continue to digitize and rely on technology, it is imperative that employees have the knowledge and skills necessary to effectively use these systems. Unfortunately, there is a growing trend of cyber security breaches occurring due …

The Importance of IT Literacy: How Employee Negligence Contributes to Cyber Security Breaches Read More »

#StopRansomware RoyalRansomware

Ransomware continues ravaging companies

In recent years, ransomware attacks have become one of the biggest cyber threats for organizations of all sizes, causing significant financial losses and disrupting business operations. To combat this growing threat, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have recently released a joint advisory, #StopRansomware: Royalransomware, aimed at …

Ransomware continues ravaging companies Read More »

Apple Security Updates

Apple Releases Security Updates

Apple has recently released security updates for several of its products, including Safari, iOS, iPadOS, and macOS. The updates are designed to address vulnerabilities that could allow an attacker to take control of an affected device. The Cybersecurity and Infrastructure Security Agency (CISA) has recommended that all users and administrators review the Apple security updates …

Apple Releases Security Updates Read More »

Cyber Attacks Scams Elderly

Protecting our Elderly

When it comes to cyber scams and attacks, by far the most vulnerable are the elderly. We can all help them to be more aware of what to look out for when they do venture online. Here are the most common scams targeting the elderly. Phishing scams: These are attempts to trick individuals into providing …

Protecting our Elderly Read More »

LastPass Breach Password Managment Software

Are you using LastPass?

For several years, LastPass has been one of the password management software applications we’ve recommended. Recently, they announced they suffered a breach at one of their cloud storage facilities. That recent report was updated last week, and the breach is worse than what was initially reported. Here’s what you need to know and what you …

Are you using LastPass? Read More »

HIPAA Compliance 101

HIPAA Compliance 101

To become HIPAA compliant, your business will need to implement several physical, technical, and administrative safeguards to protect the confidentiality, integrity, and availability of protected health information (PHI). Some steps you may need to take include: Conducting a risk analysis to identify potential vulnerabilities and threats to the confidentiality, integrity, and availability of PHI. Implementing …

HIPAA Compliance 101 Read More »

HIPAA Security Reminders

 

HIPAA Security Suite has developed a weekly HIPAA Security Reminder series that’s FREE for all of us who are responsible for, or engaged in, the use and protection of PHI.

Pursuant to Section 164.308(a)(5) of the HIPAA Security Rule, the Standard states: Implement a security awareness and training program for all members of its workforce (including management).

This standard is part of our Best Practices Recommendations for HIPAA Security Suite users, but it’s available for FREE to anyone who wants to comply with HIPAA using the easiest, best tools available.

Sign Up

Scroll to Top