Four Steps to Prevent Anarchyware

Background: Just a few months ago, in an office far from the U.S. mainland, a contractor clicked open a seemingly innocuous email and it began. Senior management at a well-known company awoke to their worst nightmare: systems all over their network infrastructure were...

Incident Response 101: What Should You Document and Report after a HIPAA Breach?

In the first two installments of this series discussing the next steps HIPAA regulated organizations must take after a security breach. So far, we have looked at: Who is Required to Report a Breach? When Do You Need to Report a Breach? Next, let’s discuss what is to...

Incident Response 101: Who is Required to Report a Breach?

We know you have questions. In Part One of a planned series of articles to look at the basic considerations of Incident Response best practices, let’s start with understanding who is required to report a security incident to regulatory authorities, government...
Click to Call Us Skip to content