NIST SP 800-171 prescribes 110 security requirements to protect the confidentiality of data. NIST SP 800-171A details 320 assessment procedures for these security requirements. The following blog explores in detail the first security requirement 3.1.1.
So what exactly is PFR and how should you go about tracking it? What should you do to make sure your patients are paying their bills promptly? Let’s get into it.
If your design is feeling a bit stale, or you simply want to add more content, it might be beneficial to redesign your website. Let’s go over some main areas for you to consider when redesigning your website while protecting your SEO efforts.
What does a HIPAA risk assessment look like? Is there a specific template to follow? In this blog, we will go over what exactly a risk assessment is, why you need it, and steps to take to create your own risk assessment template.
To identify threats, improve your cybersecurity framework, and master risk management, you should follow a cybersecurity risk assessment checklist. If you don’t have one or aren’t familiar with making a checklist, take a look at our no-nonsense 6-step checklist!
We had the opportunity to interview Paul Hugenberg III, Founder and CEO of InfoGPS Networks, about the importance of risk management, the qualities of a good CISO, and when to outsource to a vCISO.