Blog

The Privacy and security issues of expanding Telehealth

Telehealth is the distribution of health-related services and information via electronic channels allowing long-distance patient and clinician contact, care, advice, reminders, education, intervention, monitoring, and remote admissions. There has been a many fold increase in the adoption due to COVID 19 and patients being unable to travel to meet doctors. It is important to understand …

The Privacy and security issues of expanding Telehealth Read More »

The Journey from HIPAA Compliance to HITRUST Certification

In today’s complex technological world, there is always the danger of a hostile threat environment lurking around the corner, waiting to manipulate the potholes in the processes and technology. People and organizations with malicious intent always try to act upon such opportunities and cause everlasting damage to the organization’s reputation and finances. In such a …

The Journey from HIPAA Compliance to HITRUST Certification Read More »

Common Controls Framework of Industry-acclaimed security standards

Today’s world is an ever-changing scenario with changes to the technology sector happening more frequently than ever due to emerging technologies. The case is quite similar in the field of Cyber Security. There are a few industry-acclaimed cybersecurity standards for governing the processes and execution of these standards. These standards are usually built upon a …

Common Controls Framework of Industry-acclaimed security standards Read More »

Securing your O365

E-mails are the most used productivity tool by employees. They are also a treasure trove of information and are a lucrative target for hackers as all your data – company, employee, client, etc. are present in one place. Microsoft’s O365 has been a gamechanger in the world of e-mail. It’s easiness, mobility & ready-to-use ability …

Securing your O365 Read More »

Risk Management Framework – Managing & Measuring what matters

A risk management program allows you to manage overall information security risk.  It is an approach to identify, quantify, mitigate, and monitor risks.  The reason to look at risk in a comprehensive manner is to make sure no one area is getting too much attention or, too little. Frameworks also help you identify the bigger …

Risk Management Framework – Managing & Measuring what matters Read More »

Data Privacy & Protection – Why you should be concerned

In the digital age data privacy & protection is a huge concern for company of all sizes. In part, because data breaches are happening daily, exposing personal data of millions of people. A direct consequence of a breach – individuals whose data is exposed can suffer identity theft/financial loss; and companies risk financial costs, loss …

Data Privacy & Protection – Why you should be concerned Read More »

Unsecured APIs – Underlying threat waiting to be realized

APIs & Web Services are essential supporting building blocks for today’s applications. They’re not only the connective tissue between applications, systems, and data, but also the mechanisms that allow developers to leverage and reuse these digital assets for new purposes. Developers can utilize these building blocks to integrate advanced functionality and features into their software …

Unsecured APIs – Underlying threat waiting to be realized Read More »

1 Minute Guide to the Updated HITRUST Scoring & Metrics for 2020

At the start of the year, HITRUST released an updated methodology for scoring requirements. This will ensure that organizations focus on maintaining a robust program with implemented controls for enhancing security posture and adherence to HITRUST. Hence, if you’re on the path to HITRUST or new to it, the following will be applicable to you: …

1 Minute Guide to the Updated HITRUST Scoring & Metrics for 2020 Read More »

The role of the modern CTO with regards to Cybersecurity

How the times have changed. 15 years ago, cyber-security consisted of making sure you had an anti-virus program running on your machines. It didn’t matter if it was effective, but the presence was enough to assuage our cybersecurity requirement. Though phishing, ransomware, data breaches, and compliance existed, we never treated it as a primary concern. …

The role of the modern CTO with regards to Cybersecurity Read More »

Scroll to Top

CONTACT US TO MAKE YOUR NEXT MOVE

This website uses cookies to ensure the best user experience. By using this site, you agree to the use of cookies as explained in our privacy policy.