HIPAA Training Requirements
|

HIPAA Training Requirements

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) aims to safeguard Protected Health Information (PHI) from theft and fraud. Not just doctors and nurses but anybody who handles medical records should undergo HIPAA training to be conversant with its requirements.  Companies should conduct general awareness and role-specific HIPAA training programs. Should a breach…

SOC 1 vs SOC 2 vs SOC 3 Comparison — Overview & Comparison
| | |

SOC 1 vs SOC 2 vs SOC 3 Comparison — Overview & Comparison

If you run a SaaS business and want to target mid-market or enterprise customers, you are going to be asked about the security posture of your company at one point or another. You may try to pass through them by answering security questionnaires but when your sales deal is stuck and cannot move forward because…

General Data Protection Regulation (GDPR) Compliance
|

General Data Protection Regulation (GDPR) Compliance

Key Points Introduction The widespread adoption of cloud services has also brought challenges in the form of cybersecurity threats and multiple privacy regulations across different jurisdictions.  Pew Research Center found that 79% of respondents were concerned about how their personal data was gathered and processed by companies and the government.  Customers that rely on multiple…

Who Does HIPAA Apply To [Top 5 Entities]
|

Who Does HIPAA Apply To [Top 5 Entities]

Key Points Introduction Looking for answers to questions like who does HIPAA apply to? Or ‌ whether HIPAA applies to you and your employees?  The answers to these questions simply depend on whether your cloud-hosted company meets the criteria of HIPAA compliance. HIPAA, also known as the Health Insurance Portability and Accountability Act, is a…

SOC Reports: Why Does Your Business Need Them?
| | |

SOC Reports: Why Does Your Business Need Them?

SaaS adoption has increased across the board, especially in large enterprises. Accelerated digital adoption is a result of the COVID-19 pandemic. It has added to the growing cybersecurity risks of today’s cloud-based environments. Cloud services provide large enterprises the opportunity to save costs and increase efficiencies. But, it requires them to share sensitive data with…

12-Step Checklist To Get GDPR Compliance in 2024
| |

12-Step Checklist To Get GDPR Compliance in 2024

Key Points Introduction A typical day in your life involves a large amount of your personal data being collected, tracked, and harvested. Trackers embedded in the apps you’re using collect location data, your online behavior, what sites interest you, and how much time you’re spending on them. When data breaches occur at major cloud-hosted companies,…

End of content

End of content