HIPAA Risk Management

HIPAA risk management

What is Security Risk Assessment? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) security rule (SRA) conducts a thorough and accurate assessment of the potential risks and vulnerabilities to the organization’s electronic protected health information’s confidentiality, integrity, and availability. The Security Rule of the Health Insurance Portability and Accountability Act (HIPAA) mandates businesses […]


HIPA Audit

The Office for Civil Rights (OCR) of the United States Department of Health and Human Services (HHS) enforces federal civil rights laws, conscience and religious freedom laws, the Health Insurance. The Patient Safety Act and Rule and the Health Insurance Portability and Accountability Act (HIPAA) Rule all defend your fundamental human rights to equal treatment, […]



ESG reporting is a criterion that considers the integrated social and environmental awareness of a company on three bases: Environmental (What effect do company operations have on the environment?) Social (The impact of an organization’s operations on its employees and communities). Governance (What a firm performs and how the organization is run?). ESG Reporting is […]

Risk Of Losing Cyber Insurance With No Backup – In Case Of A Data Breach, Your Organization Will Be Liable.

What Is Cyber Insurance?  Cybersecurity insurance alleviates losses from many cyber incidents such as business, data breaches, and network damage. Robust cybersecurity insurance can help in reducing the variety of cyberattacks by: Promoting the adoption of precautionary measures in return for more coverage. Supporting the implementation of good practices by basing premiums on the self-protection […]

Security is expensive and difficult 

Keeping data private and secure has become increasingly challenging for companies. Data usually has to be stored on behalf of users on a server or cloud service somewhere. Responsibility for security and privacy lies with the company storing the data. This involves several hurdles. First of all, data breaches have become extremely common. A black […]

HIPAA, GDPR, CCPA Compliance for Telemedicine Start-ups

Non-compliance is very expensive. Organizations are stepping on thin ice when it comes to building applications that process Protected Health Information (PHI). There is a lot of overhead associated with building and implementing HIPAA-compliant systems. Understanding legal nuances and their technical implications is a mountain to climb. The risk of non-compliance with regulations is simply […]

The cost of innovation for CISOs

RSA conference was slow this year. There was less noise, less disposable gadgets and fortune wheels spun slower. San Francisco was still flooded with people and hotel prices spiked because of the limited space. Some panelists were better prepared than others. There might be a shift from technology and business to simple tube-marketing at RSA. […]

The 97%

97% of all data breaches happen on unencrypted data (Gemalto Report). This number can tell us a lot. Only 3% of data breaches happen on encrypted data. Companies don’t encrypt the data or often fail at implementing it correctly. Why? There are many reasons why that happens and most important are lack of awareness and […]

Introduction to Modern Cryptography

A Long History of Mathematical Trust   Cryptography is not a new field. It has existed for thousands of years. There has always been a need to keep secrets and encrypt messages, mainly for military and political reasons, but also for commercial and industrial confidentiality. However, the goals and methods of cryptography have evolved over […]

Information is now even more valuable than cash

In a sleepy town of Laguna Niguel, California there is a dynamite explosion at United California Bank, it’s March 24th, 1972. Burglars led by Amil Dinsio break into a concrete reinforced of the vault stealing $9 million ($55 million today). Hollywood style investigation and dirty laundry lead to the arrest and conviction of the masterminds […]