New York Implements Stricter Hospital Cybersecurity Regulations
by William DePalma on October 15, 2024 at 5:06 PM
On October 2, 2024, New York State implemented groundbreaking cybersecurity regulations specifically targeting the state’s general hospitals. These regulations are a significant step forward in safeguarding sensitive patient data and healthcare operations, marking a notable shift in h …
HECVAT vs. SOC 2: Find Out the Difference
by William DePalma on October 10, 2024 at 3:30 PM
Organizations today, particularly those handling sensitive data or offering IT services, must respond to mounting calls for transparency on security and compliance procedures. Two such frameworks that fulfill this need are the Higher Education Community Vendor Assessment Toolkit (HECV …
Does Fitbit App Collect Sensitive Data? Exploring Privacy Questions
by Nicholas Foisy on October 10, 2024 at 1:20 PM
Wearable technology like Fitbit has become a key tool for people looking to monitor and improve their health. However, as these devices collect and store significant amounts of health data, it’s natural for users to have concerns about privacy, security, and how their information is h …
What Are the 3 Important Rules for HIPAA Compliance?
by Kyle Daun on October 9, 2024 at 12:00 PM
HIPAA is designed to protect patient information and ensure its secure handling. As healthcare continues to digitize, compliance with HIPAA’s key regulations is critical for safeguarding sensitive data and maintaining patient trust. This blog post highlights the essential rules health …
What is a SOC 2 Gap Assessment? The First Step to Compliance
by Jerry Hughes on October 8, 2024 at 12:00 PM
A SOC 2 gap assessment is a crucial step for organizations aiming to achieve SOC 2 compliance, especially those providing services like cloud computing, SaaS, and other technology-driven solutions that manage sensitive customer data. From my personal perspective, a SOC 2 gap assessmen …
SOC 2 Common Criteria List: CC-Series Explained
by Jerry Hughes on October 4, 2024 at 2:30 PM
SOC 2, a widely recognized auditing framework developed by the American Institute of Certified Public Accountants (AICPA), is designed to assess the effectiveness of a service organization’s controls around data security. The SOC 2 report is based on the five Trust Services Criteria ( …