The search found 3763 results.
Blog
While there are a variety of policies, providers, and cyber insurance offerings in the market, at its foundation, cyber insurance is an insurance policy that organizations purchase in the event of a successful cyber attack or data breach. As home or car insurance helps protect you when the worst happens by helping with the cost of recovery; for cyber insurance, the policy will reimburse the organization for financial losses sustained from the attack.
Blog
On April 7- 10, 2019, the Health Care Compliance Association (HCCA) is hosting its Compliance Institute in Boston. With over 100 sessions, networking opportunities, and an exhibit hall full of...
Blog
Cloud spending is forecasted to reach $160 billion in 2018 – a 23.2 percent increase over 2017. Businesses around the globe are capturing the benefits of cloud technology to meet consumer demand...
Blog
When it comes to securing internal credentials, controlling the movement of internal users, and provisioning or de-provisioning internal access rights, it can be done in-house. Enterprise access management best practices call for aligning those user rights with an internal HR system, and creating a robust access policy for internal users is do-able for most organizations, especially when it’s dealing with internal access and more routine access points (like email).
Blog
Patient data is being accessed every day at healthcare facilities to the point where an EMR system can experience over a million accesses in just one day. HIPAA requires that all of that patient data is audited to ensure each access attempt is appropriate, so it’s the job of compliance officers to make sure these audits happen.
Blog
Deciding which remote access solution to use is not a simple or quick decision for most people, and it doesn't matter if you work in a large enterprise, a midsized organization, a small business, or on a solo project.
News
Striking the right balance between complex passwords, security and workflow efficiency is a big challenge for healthcare CISOs and CIOs. The rising number of publicly reported breaches shows the need to balance all three. Healthcare security leaders no longer can rely upon just firewalls to protect the four walls of their organizations. For example, they need to control access to customer data, systems and other information at each point of entry – each device and each user – with complex passwords that are much harder to hack.
Blog
The NSA and CISA have shared actionable guidance for protection against evolving cyber threats to digital identities.