How to Safeguard Your Data According to HIPAA Cloud Compliance
|

How to Safeguard Your Data According to HIPAA Cloud Compliance

Your cloud service provider is HIPAA compliant. But that doesn’t mean you are too!  As a Covered Entity or a Business Associate who uses a HIPAA-compliant cloud to create, receive, maintain, and send protected health information (PHI), your compliance efforts don’t and mustn’t end there. While using a compliant cloud service provider is a must,…

Five Benefits of ISO 27001 Certification
|

Five Benefits of ISO 27001 Certification

The ISO 27001 certification can help your organization add to its security posture and make it formidable and armed to fend off security breaches, security incidents and cyber-attacks.  Having a ISO 27001 certification demonstrates your compliance with global best practices regarding information security and evinces trust in your customers’ ecosystem regarding your data security practices. …

Seven GDPR Principles You Must Know In 2024
|

Seven GDPR Principles You Must Know In 2024

Businesses that process customer data are liable to various privacy protection laws depending on the location where they operate. In Europe, data privacy regulations are pretty rigorous. Non-European businesses trying to expand into this continent often find themselves drowning in a sea of GDPR regulations.  To make things easier, let us start with the basics…

ISO 27001:2013 (An In-Depth Overview)
|

ISO 27001:2013 (An In-Depth Overview)

In response to growing security concerns and breaches, the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) published ISO 27001 in 2005.  It was revised in 2013 to keep the document to sync with global changes in technology and processes, and most recently in 2022. The 2013 version is not significantly different…

Vulnerability to Vigilance: The importance of Security Configuration Management
|

Vulnerability to Vigilance: The importance of Security Configuration Management

In an incident, an Amazon S3 bucket containing 1.5 million files was leaked due to a misconfiguration. It comprised sensitive data such as national ID numbers, employee PII, etc. Data breaches due to misconfigurations are common, and 80% of ransomware attacks are also attributed to misconfigurations.  Misconfigurations are unintentional and common but have a devastating…

End of content

End of content