Auditing and logging for HIPAA

Auditing and logging for HIPAA

Auditing and logging are an important part of the HIPAA Security Rule, but the rule contains no specifics on this requirement. According to HIPAA Security Rule – 164.312(b):“Implement hardware, software, and/or procedural mechanisms that record and examine...
5 core functions of effective cybersecurity – #1 Identify

5 core functions of effective cybersecurity – #1 Identify

Since the National Institute of Standards and Technology Cyber Security Framework (NIST CSF) was established, it has become the framework of choice for organizations to align with to establish “best practice”, and is the foundation for most US cyber...
Record fines come on the heels of warnings about cyber risk

Record fines come on the heels of warnings about cyber risk

Record fines come on the heels of warnings from US Intelligence warning of a growing risk to our utility providers.  Similar warnings have been issued for law firms, higher education, and small businesses, so this information is relevant to a wide spectrum of...
Growing Revenue with Foresite

Growing Revenue with Foresite

We are very excited about 2019 as our Reseller Channel continues to grow. We know that in addition to wanting to solve cybersecurity and compliance problems for your clients, you also partnered (or are considering partnering) with Foresite to grow revenue.   Here...
SOC2 for Small Businesses

SOC2 for Small Businesses

More and more we see small businesses being asked by their clients for some sort of assurance that the data shared with them is kept secure and private. Many times a SOC 2 certification is being requested.  If this happens to you (or your client), the question is...