| May 6, 2020 Achieve Secure Cloud Adoption using HITRUST We explain how using HITRUST to achieve secure cloud adoption helps assign responsibility for security controls between businesses and third-party vendors.
| May 5, 2020 3 things for HIPAA Compliance when returning to normal operations Here are things your workers responsible for protecting the privacy of PHI at all times should do for HIPAA compliance when returning to normal operations.
| May 4, 2020 VMWare ESXI Vulnerability Allows Malicious Code Injection Learn about CVE-2020-3955, a VMWare ESXI vulnerability caused by the improper validation of user-supplied inputs, and what to do to protect your business.
| Apr 30, 2020 HIPAA Encryption Requirements & Standards For 2022 Learn everything you need to know about successfully complying with HIPAA encryption standards and requirements to protect ePHI.
| Apr 28, 2020 Remaining PCI compliant while reopening following COVID-19 Businesses returning to normal operations and that handle credit cards must keep their eye on remaining PCI compliant while reopening following COVID-19.
| Apr 28, 2020 How to know if your MSSP is equipped to support you through a breach It’s crucial your MSSP is equipped to support you in the case of a breach by being able to pivot from normal operations to incident response on your behalf.
| Apr 27, 2020 New Spear Phishing Attacks use fake O365 link to gain access Avertium reports on new spear phishing attacks by a well-known threat actor involving a macro infested Word document using a fake Office 365 link.
| Apr 24, 2020 Why Pen Tests are key to a Robust Incident Response Plan Security incidents are expensive and timely detection is key. You can develop a more relevant IR plan by assessing vulnerabilities through a pen test.
| Apr 14, 2020 How to protect workers from increased phishing attacks during COVID-19 Protect your workers from increased phishing attacks during COVID-19 by teaching them phishing scam indicators, creating a safe reporting culture, and more.
| Apr 13, 2020 CVE-2020-3952 VMWare vCenter Software Vulnerability This report is about the CVE-2020-3952 VMWare vCenter software vulnerability caused by improper access controls affecting the VMware Directory Service.