Oct 2021: a printer in a hospital in Tokushima, Japan, started printing out papers on its own after their systems were compromised by ransomware. Attackers demanded money in exchange for decrypting the encrypted patient data of 85,000 patients. They recovered eventually but could have avoided the situation had they deployed incident response software. The security…
The hardest thing about SOC 2 is knowing where to start. What makes it even tougher is the fact there’s no easy template to follow – every SOC 2 audit is unique to the organization carrying it out. However, there’s no need to despair! “While there’s no one size fits all answer, there are several…
You’ve likely got the CCPA basics down, and you’re familiar with the ins and outs of the California Consumer Privacy Act (CCPA). If not, you can refer to our recent article on CCPA compliance to brush up on the essentials. In this article, we’ll talk about something equally important: CCPA exemptions. At first glance, you…
Healthcare businesses often assume that if a vendor is trusted or has experience working with another healthcare service before, they’re automatically covered. But HIPAA doesn’t work on assumptions. Without a BAA (Business Associate Agreement), even well-intentioned data sharing can turn into a compliance nightmare. This is because businesses need assurance that service providers accessing PHI…
You are here because somewhere in your business improvement plan because your business prospects specifically asked you for your SOC 2 certification. For a cloud hosted company processing sensitive customer data, this is not uncommon and a major sales unblocker. But in order to be certified, you should understand the nitty gritties of the process. …
The need for effective cybersecurity measures has never been more pressing in our globally interconnected society, where the spread of digital technologies affects every aspect of our lives. NIST 800 170 is a noteworthy compliance offering federal agencies and organizations invaluable insights into creating personalized security measures catered to their particular needs. It attempts to…