Threats, Vulnerabilities and Risk, Oh My! What is the difference between an information threat, vulnerability and risk? For some reason, these terms are confusing, but understanding of these concepts is critical when preparing to protect your critical data. Threats A...
Welcome to our new website! Building new websites is always a huge undertaking. Besides the design and content, you need to consider your SEO, embedded forms and making sure it all loads perfectly on phones, tablets and desktops/laptops. This process is honestly...
Flexible Work Arrangements If the risk to our region becomes elevated, businesses may consider implementing / expanding their work-from-home policy. Although this is not appropriate for all job functions or industries, many duties can be performed remotely with proper...
The term “security audit” is often used synonymously with security risk assessment and risk analysis. A security audit for HIPAA compliance is when Health and Human Services (HHS) audits a covered entity or business associate to determine their level of compliance...
Brandon Haggerty, CISSP, GCWN Director of Security and Professional Services BA St John’s University MS Minnesota State University – Mankato NorthStar is pleased to announce that Brandon Haggerty, CISSP has joined NorthStar in a full-time capacity as of...
FISASCORE is a comprehensive, risk-based measurement of information security assigned to your company based on a proven and thorough assessment process. Once completed, FISASCORE will identify critical vulnerabilities, control gaps/ deficiencies, and applicable...