In Part One of a planned series of articles to look at Incident Response best practices, we start by discussing who is required to report a security incident to regulatory authorities, government agencies, or consumers/patients.
Companies should have a policy that defines in specific terms what constitutes an information security incident, and provides a step-by-step process to follow when and if an incident should occur.
If an app is not offered in your phone’s App Store, consider this a warning sign. Downloading rogue apps is very risky. There are other warning signs that you and your employees should beware of as well. Learn how to spot dangerous apps in this month’s security tip.
You know that security training is a key component of compliance. Making the necessary training a regular and effective part of the organization’s procedures can be difficult for any organization.
Healthcare providers will now have a little more time to meet compliance and to reap the financial benefits of being compliant.
As a first line of defense, password management is critical to the overall security of your entire organization.
Risk Assessment is your first step to compliance. Get answers to questions like: “Does my company need a risk assessment?” “Who should perform our risk assessment?” “What should we expect of a risk assessment?”
See how two stolen laptops containing PII for 1.2 million patients led to a multi-million dollar headache for on healthcare provider.
There is a growing population of young people attending Virtual School programs designed to allow students to learn at an individual pace. With the tremendous benefits to these systems, there are also risks.