We conduct dozens of security risk assessments for clients each year. It’s not surprising that we see a common pattern of issues among many of the organizations. Below is a description of these issues and what you can do to manage the risk associated with them. ...
No matter how long you have been dealing with HIPAA there are probably some parts you just don’t get. In the end, the HIPAA Security Rule exists to prevent bad stuff from happening. So what is your risk of bad stuff happening? That’s the purpose of one of the HIPAA...
Learn the basics of safety during NATIONAL CYBER SECURITY AWARENESS MONTH National Cyber Security Awareness Month (NCSAM) — held annually in October — is a collaborative effort between government, industry and organizations of all sizes to help you — and everyone —...
Executives and board members are slowly but surely starting to realize that information security efforts need to become a priority. Current efforts to protect information are now subject to more scrutiny by their customers, insurance companies and the government....
Satkunam Receives Cyber Security Certification Ken Satkunam, President of NorthStar Technology Group, has recently received his Certified Information Security Manager (CISM) from ISACA The CISM certification promotes international security practices and...