Blog

1 Minute Guide to the Updated HITRUST Scoring & Metrics for 2020

At the start of the year, HITRUST released an updated methodology for scoring requirements. This will ensure that organizations focus on maintaining a robust program with implemented controls for enhancing security posture and adherence to HITRUST. Hence, if you’re on the path to HITRUST or new to it, the following will be applicable to you: …

1 Minute Guide to the Updated HITRUST Scoring & Metrics for 2020 Read More »

The role of the modern CTO with regards to Cybersecurity

How the times have changed. 15 years ago, cyber-security consisted of making sure you had an anti-virus program running on your machines. It didn’t matter if it was effective, but the presence was enough to assuage our cybersecurity requirement. Though phishing, ransomware, data breaches, and compliance existed, we never treated it as a primary concern. …

The role of the modern CTO with regards to Cybersecurity Read More »

Insider Threats—Healthcare’s Crippling Reality

We often learn about the latest security issues, threats, vulnerabilities, attacks, and ransoms every day. While much of the advertised information we read is about external vulnerabilities, there is another, often-overlooked, hazard lying in wait: Insider threats. What are Insider Threats? An insider threat is an often-overlooked security threat from within an organization. Often an …

Insider Threats—Healthcare’s Crippling Reality Read More »

HITRUST just released Version 9.3 of the HITRUST CSF. How will that affect your company?

On October 28, 2019, HITRUST announced the release of version 9.3 of the HITRUST CSF information risk and compliance management framework. The HITRUST CSF is an important step in the HITRUST certification process. It provides necessary risk management and compliance methods that helps organizations ensure that their security programs are aligned and meets compliance standards. …

HITRUST just released Version 9.3 of the HITRUST CSF. How will that affect your company? Read More »

Five Important Concerns of Cybersecurity Today

October is National Cybersecurity Awareness Month​ and it’s a reminder that we need to be vigilant about protecting our privacy and our business from possible cyber attacks.  This initiative is a joint effort between the US government and the technology industry to spread cybersecurity awareness. This year’s theme is “Own it, secure it, protect it” …

Five Important Concerns of Cybersecurity Today Read More »

Deepfake videos are everywhere. So how do we know what’s real?

Remember the phrase “Seeing is believing?” Deepfake videos have people second guessing what they are watching. Deepfakes are videos manufactured by AI technology that can superimpose someone’s face on another person’s face and manipulate them into saying or doing things that didn’t happen. These videos have been used to spread propaganda on social media networks …

Deepfake videos are everywhere. So how do we know what’s real? Read More »

Who should prepare for the California Consumer Privacy Act?

Any for-profit company that does business or has customers in California should prepare for the California Consumer Privacy Act (CCPA). Here’s why they should. The CCPA applies to businesses that are collecting data and personal information of residents in California, who meet one of the following conditions: Has an annual gross revenue of $25 million …

Who should prepare for the California Consumer Privacy Act? Read More »

Lessons from our recent HITRUST Community Extension Program.

On August 27, 2019, ESHA IT, facilitated a successful HITRUST Community Extension Program in New York city. Security and Technology professionals from organizations in healthcare, finance and technology attended the town hall. Michael Parisi, VP of Assurance Strategy & Community Development was the main speaker and he did a great job informing the attendees about …

Lessons from our recent HITRUST Community Extension Program. Read More »

Scroll to Top

CONTACT US TO MAKE YOUR NEXT MOVE

This website uses cookies to ensure the best user experience. By using this site, you agree to the use of cookies as explained in our privacy policy.