HITRUST just released Version 9.3 of the HITRUST CSF. How will that affect your company?

On October 28, 2019, HITRUST announced the release of version 9.3 of the HITRUST CSF information risk and compliance management framework. The HITRUST CSF is an important step in the HITRUST certification process. It provides necessary risk management and compliance methods that helps organizations ensure that their security programs are aligned and meets compliance standards. …

HITRUST just released Version 9.3 of the HITRUST CSF. How will that affect your company? Read More »

Five Important Concerns of Cybersecurity Today

October is National Cybersecurity Awareness Month​ and it’s a reminder that we need to be vigilant about protecting our privacy and our business from possible cyber attacks.  This initiative is a joint effort between the US government and the technology industry to spread cybersecurity awareness. This year’s theme is “Own it, secure it, protect it” …

Five Important Concerns of Cybersecurity Today Read More »

Deepfake videos are everywhere. So how do we know what’s real?

Remember the phrase “Seeing is believing?” Deepfake videos have people second guessing what they are watching. Deepfakes are videos manufactured by AI technology that can superimpose someone’s face on another person’s face and manipulate them into saying or doing things that didn’t happen. These videos have been used to spread propaganda on social media networks …

Deepfake videos are everywhere. So how do we know what’s real? Read More »

Who should prepare for the California Consumer Privacy Act?

Any for-profit company that does business or has customers in California should prepare for the California Consumer Privacy Act (CCPA). Here’s why they should. The CCPA applies to businesses that are collecting data and personal information of residents in California, who meet one of the following conditions: Has an annual gross revenue of $25 million …

Who should prepare for the California Consumer Privacy Act? Read More »

Lessons from our recent HITRUST Community Extension Program.

On August 27, 2019, ESHA IT, facilitated a successful HITRUST Community Extension Program in New York city. Security and Technology professionals from organizations in healthcare, finance and technology attended the town hall. Michael Parisi, VP of Assurance Strategy & Community Development was the main speaker and he did a great job informing the attendees about …

Lessons from our recent HITRUST Community Extension Program. Read More »

Are we forgetting to “lock the front door” when we invest in Cybersecurity? Lessons from the Capital One and Equifax data breach.

Like my high school coach always said, “Stick to your basics”. The Equifax and CapitalOne breaches reminds us that cyber-attacks don’t always come from sophisticated hacking groups. I’m sure these companies were using the best cybersecurity software that money could buy. They probably had good internal and external IT support.  However, the data breaches they …

Are we forgetting to “lock the front door” when we invest in Cybersecurity? Lessons from the Capital One and Equifax data breach. Read More »

FaceApp screenshot

Should you be concerned about the security of FaceApp?

FaceApp, the AI-powered picture-editing program, is trending in social media. We’ve all seen the pictures of celebrities using FaceApp to make themselves look older or younger. However, security experts are concerned about the possibility that the app could access more than pictures. Many users don’t realize that the app, owned by an overseas company, doesn’t …

Should you be concerned about the security of FaceApp? Read More »

How can your company prevent a data breach through a third-party vendor?

Companies of all sizes are doing a good job beefing up their cybersecurity and that’s great. But… many are forgetting an often overlooked target – their third party service providers. Any company that uses a third-party CRM software or an outside a server with access to sensitive or confidential data, could be risking a data-leak. …

How can your company prevent a data breach through a third-party vendor? Read More »

10 reasons why just buying a security product is not a strategy.

With the number of security breaches occurring right now there is a tremendous focus on cybersecurity in companies of all sizes. In many cases, the board wants to know that this is being focused on.  For a mid-size company with multiple competing priorities, the amount of investment they can make on cybersecurity is limited. The …

10 reasons why just buying a security product is not a strategy. Read More »

Scroll to Top

This website uses cookies to ensure the best user experience. By using this site, you agree to the use of cookies as explained in our privacy policy.