Cindy Kaplan2024-07-02T17:49:22+00:00Tags: email, ePHI, HIPAA, HIPAA Compliance, PHI, Protected HEalth Information, secure email, TLS|
How to Quickly Respond to Computer Intrusions – HALOCK
The moment you realize you are experiencing a network-based breach, you (more…)
THE JP MORGAN CHASE HACKER INDICTMENTS EXEMPLIFY HOW BACKWARD THE INFOSEC SPACE IS
HACKER INDICTMENTS – Cybersecurity audits mean nothing to hackers. And in (more…)
WHAT IS HIPAA?
HALOCK is deep in the regulatory compliance and (more…)
PREPARING FOR YOUR DATA BREACH
PREPARING FOR YOUR DATA BREACH.
Most InfoSec professionals don’t want (more…)
Lessons in Risk Management: What We Should Learn from the FAA Fire
Too often in information security we focus on the confidentiality of (more…)
Code Spaces Spaced Out On Data Security
The information security community is abuzz with the news of Code (more…)