How Healthcare Orgs Can Implement Strong End-User Security

End-user security is a critical aspect to overall health data security, especially as more organizations are implementing technologies allowing employees to be mobile. Read HIMSS Privacy and Security Director Lee Kim JD list five key tips for healthcare organizations for improving their end-user security on Health IT Security.

Merging GDPR compliance and cyber-risk management

In preparing for the impending implementation of the EU General Data Protection Regulation, many organizations today are elevating cyber-risk to the top of the corporate agenda, a new cyber-risk perception survey has found. Read about the new report by Marsh titled GDPR Preparedness: An Indicator of Cyber Risk Management which found that many companies are using […]

Businesses and GDPR: What they need to do to be compliant?

Enforcement of General Data Protection Regulation (GPDR) is now just few months away. The media have intensively examined and written about this topic from practically every angle since it became legislation. Businesses continue to struggle with both understanding and implementation of what they need to do to be compliant. Read ESET’s Tony Anscombe’s interview about how […]

Acting on the cyber executive order: 3 keys to compliance

Read hawn Campbell’s article about the 3 keys to compliance to the new cyber security Executive Order on FCW : Nearly six months after President Donald Trump issued his Executive Order on Strengthening the Cybersecurity of Federal Networks And Critical Infrastructure, actual implementation is getting underway. Read his full article here.

5 common HIPAA compliance pitfalls for healthcare orgs to avoid

For a healthcare organization to be HIPAA compliant it needs to ensure the right patient controls and rights are in place when it comes to protected health information. But in an age where cyber threats are growing in both sophistication and proliferation, it adds a level of complexity. Read healthcare attorney Matthew Fisher list five […]

The Cybersecurity Regulatory Crackdown

Read Juliette Rizkallah’s article about the various regulatory compliance that companies have to go through in modern world on Forbes : We claim we are in a new era of cybersecurity threats and that ransomware is the threat du jour, given how WannaCry and Petya continue to make waves. But we are also in an […]

How to protect against data breaches and comply with Delaware law

Read Lisa Detwiler’s article about how companies can comply with the newly signed Delaware data breach notification law on Delaware Business Times : The Better Business Bureau reports that as of June 30 there have already been 2,227 data breaches this year resulting in the theft of more than 6 billion records — exceeding the number […]

Many organizations still stymied by global privacy and security rules

While companies generally are aware of and intimidated by global privacy and data security regulations, many fail to properly understand and address necessary organizational changes to comply, according to a recent study by Experian Data Breach Resolution and Ponemon Institute. Read about the new study by Experian Data Breach Resolution and Ponemon Institute which reveals that […]

HHS Updates HIPAA Breach Reporting Tool, Empowers Consumers

The recently updated HIPAA Breach Reporting Tool (HBRT) will highlight recent healthcare data breaches and help consumers learn how such incidents are investigated, according to OCR. Read about the newly updated online HIPAA Breach Reporting Tool designed to help consumers find out more information on healthcare data breaches on Health IT Security.

Less than half of global executives believe GDPR compliance is relevant

Many global business decision makers are unaware of the implications of the forthcoming General Data Protection Regulation (GDPR), as well as other compliance regulations like PCI-DSS and ISO27001/2, with one in five admitting they do not know which regulations their organisation is subject to. Read about the new 2017 Risk:Value report by NTT Security which reveals […]