A Remote Workforce Risk Assessment is the First Step in Remote Work Security
Improve security of employees working from home with a risk assessment. Advances in technology have created opportunities for people to work away from the office. The benefits of remote working are well-documented in terms of reduced costs for employers, saving time and travel costs, greater flexibility for employees, and increased […]
Transitioning to a Remote Workforce: Secure Remote Access
How to secure remote access workers during the COVID-19 outbreak and beyond. While the global spread of the COVID-19 coronavirus has caused many employees to work from home, the number of remote workers was growing exponentially well before that. According to a report based on information from Global Workplace Analytics, […]
Ransomware Prevention: What Measures Should You Take to Protect Your Information?
Many government and non-government entities have already been affected by ransomware attacks. Malicious software used by cybercriminals to encrypt important information from computers and hold it for ransom has significantly evolved over the years. Ransomware, as it’s known, has become a lucrative industry for cyberthieves and continues to intensify as […]
Understanding the HIPAA Breach Notification Rule
What Entities Need to Understand About the HIPAA Breach Notification Rule With Electronic Health Records (EHR) becoming a healthcare industry standard, information security becomes highly critical to protect health records from unauthorized use and disclosure. If a breach of unsecured protected health information should occur, it’s important to inform the […]
Risk-Based Approach to Cyber and Information Security
Creating a cyber and information security program can appear to be a daunting task. Maybe you need to build one from scratch, or you already have some components in place and need to update your program so that it aligns with your organization and any regulatory requirements. Following a risk-based […]
NCUA 2019 Supervisory Priorities – ACET and IT Risk Management
The first NCUA letter to credit unions of the new year, 19-CU-01, offers Supervisory Priorities for upcoming exams, including ACET and IT Risk Management. Among the focus items are enhanced Bank Secrecy Act Compliance and Information Systems and Assurance. As anticipated, Examiners will continue their information security maturity assessments using […]
Security Compliance Associates Achieves HITRUST CSF® Assessor Designation
Learn More About SCA’s HITRUST Assessor Designation Security Compliance Associates, a leading provider of cybersecurity assessment and advisory services, today announced that it has been designated as a HITRUST CSF Assessor by HITRUST®. With this achievement, Security Compliance Associates is now approved to provide services using the HITRUST CSF, a […]
7 Tips to Securing IoT (Internet of Things) Devices
When mobile phones were first introduced, if someone were to tell you that your mobile phone could be used to copy your fingerprints or steal passwords to your emails, you would have most likely laughed at them and told them that they have been watching too many science fiction films. […]
GLBA Compliance Requirements
The Gramm-Leach-Bliley Act which is also known as the Financial Modernization ACT OF 1999, is a United States federal law that requires all financial institutions to ensure the privacy and security of customer (non-public) information. The Act consists of three sections. The Privacy Rule that regulates the gathering and disclosure […]
Focus on What You CAN Manage: People, Process and Technology
By adopting prudent information practices aligned with the size, complexity and culture of your organization, you have positioned the people, process and technology to best defend your network and data.