Show Filters
Filtering by Resource Type: Blog
5 Steps to Successful HIPAA Compliance for Self-Insured Group Health Plans
Self-insured group health plans can offer significant cost and flexibility advantages for employe...
Read More about 5 Steps to Successful HIPAA Compliance for Self-Insured Group Health Plans
Tevora’s Okta Management Tool Helps Safeguard Your Valuable SSO Data
Single Sign-on (SSO) is an important part of any effective security strategy because it significa...
Read More about Tevora’s Okta Management Tool Helps Safeguard Your Valuable SSO Data
Why HITRUST™ i1 Certification Matters for Healthcare Vendors
In this blog post, we’ll provide background on HITRUST™ and PTPRM and unpack the new PTPRM gu...
Read More about Why HITRUST™ i1 Certification Matters for Healthcare Vendors
Use ISO’s 27002 for ISO 27001 Changes
The International Organization for Standardization (ISO) is an independent, non-governmental orga...
Stopping Ransomware By Managing Third-Party Risks
Hardly a day goes by when you don’t hear about a ransomware attack that has had a devastating i...
Read More about Stopping Ransomware By Managing Third-Party Risks
Complying with SWIFT CSCF Requirements
The Society for Worldwide Interbank Financial Telecommunication (SWIFT) platform enables financia...
The Payment Card Industry Data Security Standard (PCI DSS) is the leading standard for securing c...
FFIEC & GLBA Risk Assessment and Maturity Services
What is the FFIEC? The Federal Financial Institutions Examinations Council (FFIEC) is a joint int...
Read More about FFIEC & GLBA Risk Assessment and Maturity Services
FFIEC & GLBA Risk Assessment and Maturity Services
What is the FFIEC? The Federal Financial Institutions Examinations Council (FFIEC) is a joint ...
Read More about FFIEC & GLBA Risk Assessment and Maturity Services
Navigating NIST–Which Standards Apply to You?
By Andrew Katz The National Institute of Standards and Technology (NIST) develops cybersecur...
Read More about Navigating NIST–Which Standards Apply to You?
5 Keys to Hardening Your Defenses With Okta MFA
Okta SSO (Single Sign-On) enables your team to use a single login experience to access all applic...
Read More about 5 Keys to Hardening Your Defenses With Okta MFA
HITRUST Offers Streamlined Assessment Alternatives
The HITRUST™ organization provides a framework that safeguards sensitive information and can h...
Read More about HITRUST Offers Streamlined Assessment Alternatives
The Benefits of Certifying for ISO 27701?
With data privacy concerns getting prominent play in so many headlines recently, you may be tryin...
3 Reasons to Consider HITRUST Certification in the Biotech Space
In recent years, the biotech sector has experienced a rapid shift towards next generation cloud c...
Read More about 3 Reasons to Consider HITRUST Certification in the Biotech Space
CMMC 2.0 Eases Compliance Burden
In September 2020, the Department of Defense (DoD) published version 1.0 of the Cybersecurity Mat...
Recommendations for PAX Technology POS Device Clients
Oct. 26, 2021-In light of the recent FBI and Department of Homeland Security’s court-authorized...
Read More about Recommendations for PAX Technology POS Device Clients