Steps to Avoid a Pricey Data Breach

Steps to Avoid a Pricey Data Breach

Are you swimming in information security concerns? Avoid a pricey data breach by reading further. Recent and startling new malicious attacks are causing organizations to re-think everything we know about our security posture – from breach prevention to response. Organizations are beginning to shift their focus on security when they have realized that sometimes, compliance … Read more

Penetration Tests and Their Benefits

Penetration tests and their benefits on the brain? If performed regularly, penetration tests are key to your overall security posture. It’s an important practice that gives organizations visibility into real-world threats to your security. As part of a routine security check, penetration tests allow you to find the gaps in your security before a hacker … Read more

Becoming PCI Compliant for the First Time

Becoming PCI Compliant for the First Time

Becoming PCI Compliant for the First Time Becoming PCI compliant for the first time? Becoming PCI compliant can be an overwhelming undertaking if you are unsure of where to start. With approximately 394 controls, this comprehensive data security standard can be a large undertaking that is best tackled with expert assistance. The first step toward … Read more

Phase 2 HIPAA Audits Prep

Phase 2 HIPAA Audits Prep

Phase 2 HIPAA Audits Prep Phase 2 HIPAA Audits have officially begun. You may know that the OCR is gathering information to determine which covered entities and business associates will be included in the auditee pool. If you haven’t already prepared for Phase 2 HIPAA Compliance, knowing where to begin may seem a bit overwhelming. … Read more

Creating a Compliance Culture

Wondering how to create a positive compliance culture within your company?  We’re here to help companies make managing compliance, well, manageable. We’ve defined the role and responsibilities of the Chief Compliance Officer. We’ve helped delineate what a Compliance Management System (CMS) is all about. We are now here to share the next best kept industry … Read more

Secure Web App Best Practices

Maintaining a secure web environment is extremely important in today’s technological climate. So, let’s look at secure web app best practices. Performing regular scans and tests of your security posture is best practice and one that is rapidly becoming an essential piece to maintaining security at your organization. Web applications have become a common target … Read more

Avoiding a Data Breach Caused by Medical Devices

In headlines of late, the terms “data breach” and “healthcare organization” aren’t strangers, and now relative to that, avoiding a data breach caused by medical devices is becoming a hot topic. Recent studies and investigations done by cybersecurity professionals in the industry have found that cyber hackers are beginning to use medical device vulnerabilities as … Read more

Call Monitoring Compliance

Call Monitoring Compliance

It’s important to analyze and fully understand the areas of risk as the CFPB continues to closely supervise the collections environment and call monitoring compliance. One of the biggest risks to a collection agency is communication with consumers, making the monitoring of calls a very telling practice.  An effective call monitoring program is a critical … Read more

Payment Card Security Data Flow

Payment Card Security

DATA FLOW DYNAMIC OF PAYMENT CARD SECURITY In March, the Electronic Transactions Association (ETA), a global association which represents those in the payments space, announced a partnership with the PCI Security Standards Council (PCI SCC). The new partnership brought the two together at TRANSACT 15, ETA’s annual conference, to present the industry with the most recent … Read more