Premal Parikh

Risk Management Framework – Managing & Measuring what matters

A risk management program allows you to manage overall information security risk.  It is an approach to identify, quantify, mitigate, and monitor risks.  The reason to look at risk in a comprehensive manner is to make sure no one area is getting too much attention or, too little. Frameworks also help you identify the bigger …

Risk Management Framework – Managing & Measuring what matters Read More »

1 Minute Guide to the Updated HITRUST Scoring & Metrics for 2020

At the start of the year, HITRUST released an updated methodology for scoring requirements. This will ensure that organizations focus on maintaining a robust program with implemented controls for enhancing security posture and adherence to HITRUST. Hence, if you’re on the path to HITRUST or new to it, the following will be applicable to you: …

1 Minute Guide to the Updated HITRUST Scoring & Metrics for 2020 Read More »

The role of the modern CTO with regards to Cybersecurity

How the times have changed. 15 years ago, cyber-security consisted of making sure you had an anti-virus program running on your machines. It didn’t matter if it was effective, but the presence was enough to assuage our cybersecurity requirement. Though phishing, ransomware, data breaches, and compliance existed, we never treated it as a primary concern. …

The role of the modern CTO with regards to Cybersecurity Read More »

Insider Threats—Healthcare’s Crippling Reality

We often learn about the latest security issues, threats, vulnerabilities, attacks, and ransoms every day. While much of the advertised information we read is about external vulnerabilities, there is another, often-overlooked, hazard lying in wait: Insider threats. What are Insider Threats? An insider threat is an often-overlooked security threat from within an organization. Often an …

Insider Threats—Healthcare’s Crippling Reality Read More »

Five Important Concerns of Cybersecurity Today

October is National Cybersecurity Awareness Month​ and it’s a reminder that we need to be vigilant about protecting our privacy and our business from possible cyber attacks.  This initiative is a joint effort between the US government and the technology industry to spread cybersecurity awareness. This year’s theme is “Own it, secure it, protect it” …

Five Important Concerns of Cybersecurity Today Read More »

How can your company prevent a data breach through a third-party vendor?

Companies of all sizes are doing a good job beefing up their cybersecurity and that’s great. But… many are forgetting an often overlooked target – their third party service providers. Any company that uses a third-party CRM software or an outside a server with access to sensitive or confidential data, could be risking a data-leak. …

How can your company prevent a data breach through a third-party vendor? Read More »

10 reasons why just buying a security product is not a strategy.

With the number of security breaches occurring right now there is a tremendous focus on cybersecurity in companies of all sizes. In many cases, the board wants to know that this is being focused on.  For a mid-size company with multiple competing priorities, the amount of investment they can make on cybersecurity is limited. The …

10 reasons why just buying a security product is not a strategy. Read More »

Scroll to Top

CONTACT US TO MAKE YOUR NEXT MOVE

This website uses cookies to ensure the best user experience. By using this site, you agree to the use of cookies as explained in our privacy policy.