All posts by prod360

separator

Don’t Miss These Ways to Strengthen Your Cybersecurity Plan


Office workers at table with laptops

Creating a sound cybersecurity plan means anticipating likely scenarios that might lead to a breach, and then building a strong defense. It can be complicated, nuanced, and a huge challenge — especially since cybercrime accounted for as much as $2.7 billion in financial losses in 2018. With tech that’s ever-evolving and hackers who will increasingly […]

Read More

One Year Anniversary of GDPR Compliance


Lock with GDPR text and yellow stars

Time moves fast, and that is especially true in the world of business regulation and compliance. It’s already been a year since GDPR, the European Union’s privacy law, went into effect. It took two years after GDPR was passed by the European Parliament, the Council of the European Union and the European Commission for it […]

Read More

Why Penetration Testing Needs to Be Part of Your Cybersecurity Strategy


The word cybersecurity shattered like glass

To protect your company’s valuable and sensitive data, the best offense is a good defense — a solid cybersecurity strategy that not only keeps data safe but identifies areas of weakness and vulnerability before the bad guys do. This is why penetration testing needs to be part of your cybersecurity strategy. Penetration testing, or “pen […]

Read More

3 Questions to Ask Before Your SOC Assessment


soc audit cybersecurity

A System and Organization Controls (SOC) examination is an independent, third-party assessment of a service organization’s commitment to service and trustworthiness. For any company that intends to outsource a part of its business, such as payroll, record-keeping or IT, it’s a way to vet and gain reasonable assurance that potential service providers are operating under […]

Read More

Integrated Compliance Solutions Save Time and Money


integrated compliance solutions

Data security is of paramount importance as technology continues to evolve for businesses of all sizes. Conducting compliance audits on data security on a regular basis is vital, but sometimes the sheer volume of data security compliance audits can result in audit fatigue and in financial losses as well as wasting time. An integrated compliance […]

Read More

Data Security Controls That Last


data security

Data is the lifeblood of the 21st century, and protecting it should be a top priority for everyone who touches it. Data security is also required by law, a deal-maker or breaker for some customers, and a public-interest issue that makes headlines when it fails. If a company is entrusted with sensitive data, enacting the […]

Read More

Why HITRUST CSF Needs to Be On Your Radar for 2020


hitrust csf cybersecurity

When it comes to protecting privacy and securing data and other sensitive information, healthcare organizations are some of the most scrutinized. They face a huge number of federal regulations, compliance standards and state laws, including HIPAA, HITECH, ISO 27001, PCI DSS, NIST, COBIT, and FTC. For third-party healthcare partners, this makes proving trustworthiness with sensitive […]

Read More

What is a SOC Report and Why Does My Company Need One?


soc report cybersecurity

System and Organization Controls (SOC) reports enable companies to feel confident that service providers, or potential service providers, are operating in an ethical and compliant manner. No one likes to hear the word audit, but SOC reports establish credibility and trustworthiness for a service provider — a competitive advantage that’s worth both the time and […]

Read More

ISO 27001 Lead Implementer Training Course October 2019


This five-day intensive course enables the participants to develop the expertise necessary to support an organization in implementing and managing an Information Security Management System (ISMS) based on ISO/IEC 27001.

Date:
March 18

End:
March 22

Read More

HITRUST Community Extension Program Coming to Tampa July 2019


Coordinated by HITRUST, hosted by Microsoft and facilitated by 360 Advanced, the one-day, no cost, town hall meeting will provide healthcare organizations of all types and sizes an opportunity to engage with local peers to discuss the challenges, best practices and lessons learned in effectively implementing a risk management program and improving cybersecurity practices by leveraging the HITRUST CSF, HITRUST cyber threat sharing and response, and other HITRUST programs.

Date:
July 10

Time:
1:00 pm – 6:00 pm

Cost:
Free

Read More