Loading...

Follow I.S. Partners Blog on Feedspot

Continue with Google
Continue with Facebook
or

Valid

Stakeholders have many regulations and protocols with security compliance in the financial services space. In order to meet the objectives ..read more
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

HIPAA is an integral part of any healthcare business; if you collect, store or use patient information, you are required by law to comply. ..read more
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

What Is GLBA? Businesses regularly handle consumer financial information, making it crucial to find the most reliable possible ways to keep ..read more
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

What is COSO? COSO is the acronym used to refer to a model used for testing and evaluating internal control and processes. The COSO ..read more
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

What Is Risk? In business, there will always be a certain degree of risk that any organization must face to achieve its goals. At the ..read more
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

What is PCI-DSS? Major credit card companies such as MasterCard, Visa, Discovery, American Express, and JCB International created the ..read more
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

9 Key Components of HIPAA Risk Analysis Perhaps you have received notification that you now need to perform HIPAA risk analysis for your ..read more
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

A Standard Checklist for Data Center and Audits and Reports Before taking a closer look at specialized data center audits and reports, it ..read more
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

What Is HITRUST? “The Health Information Trust Alliance (HITRUST) was born out of the belief that information security should be a core ..read more
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Each year healthcare providers’ digital databases become increasingly vulnerable to cybercriminals. At the end of 2015, The HIPAA Journal ..read more

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview