At the heart of HIPAA lies a set of core security tenets for which every affected organization is responsible.
Register for this webinar to learn:Main changes in ISO 27001 2013 revisionRequired documents for the new ISO 27001How the transition works with certification bodies12 steps to handle transition from ISO 27001 2005 to 2013 revisionHow to resolve main concerns regarding ISO 27001 implementation.This interactive live online training is designed to enable you to walk away with knowledge on the differences between the ISO 27001 2005 revision and the new 2013 revision, as well as how to structure the documentation.
In the wake of healthcare data breaches, OCR audits for HIPAA compliance have become more common – and the consequences have been more highly publicized.
It was one of our usual off-the-record discussions when I spoke with network admin and asked about the regular password change set up on the system.
Two ways that an organization can easily and cost efficiently ensure that they are meeting not only security needs but also audit and compliance laws are with role-based access control (RBAC) and two-factor authentication.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.