Always Use Two Factor Authentication but Remain Vigilant

By now, most of the major online tools we use and the most popular sites we log into offer if not require two-factor authentication (2FA). There are several ways a two factor system can be implemented but, essentially, it will always involve using something you know,...

Incident Response 101: Where Notification Requirements May Differ from HIPAA

In our recent series of articles answering the key questions about what notifications steps HIPAA regulated organizations must take after a security breach, we have looked at: Who is Required to Report a Breach? When Do You Need to Report a Breach?  What Must Be...
Click to Call Us Skip to content