HITRUST

Navigating the HITRUST Framework

The HITRUST framework is a certifiable security framework that was developed to help streamline healthcare security. Becoming HITRUST certified can seem like an intimidating task, Brittany explains why it's not as bad as you may think, and why it's well worth the time and effort.
Vendor Risk Management Best Practices

Best Practices For Implementing a Vendor Risk Management Program

Creating your own formal vendor risk management program can seem like an intimidating procedure at first. Keeping these four best practices in mind while developing your own vendor risk management program can help simplify the process and ensure that you're developing a successful and sustainable program.
Is That Website For Real? Website Trust Signals To Look For

Is That Website For Real? Website Trust Signals To Look For

With all the fake news and security threats out there today it's important to know how to tell if a website is trustworthy. Find out how.
One Information Security Metric to Rule Them All: FISASCORE™

One Information Security Metric to Rule Them All: FISASCORE™

FISASCORE™ is the definitive information security risk measurement driven from FISA™, which stands for the Fiducial Information Security Assessment. Find out what the top 10 reasons are you should know your FISASCORE™.
SOC 2

Penetration Tests v. Vulnerability Assessments

Penetration Tests vs. Vulnerability Assessments The terms Vulnerability Assessments and Penetration Tests are often incorrectly used interchangeably due to marketing hype and casual use by non-experts.
Up Your Security Game With 3 Steps for Employee Monitoring

Up Your Security Game With 3 Steps for Employee Monitoring

It’s common knowledge that humans are the greatest threat to security, especially for a small business. Employees often possess inside knowledge and levels of access that make them a threat with high potential impact, even if the probability…
Security – Back to the Basics Series - Part 3

Security – Back to the Basics Series - Part 3

Article 3: Basic Security Starts Here This is the third and final installment in our three-part series titled “Security – Back to the Basics”.  The purpose of the series was to take you from a state of confusion about information security…

The Future of Meaningful Use for Physicians

On October 14th, Medicare published the final rule on the implementation of MACRA (the Medicare Access and CHIP Reauthorization Act) which will replace Meaningful Use for Physicians and Providers in 2017. In developing the next-generation of…
Permission to Simplify

Permission to Simplify

In my time as an analyst for FRSecure, one of the biggest, most consistent traps I've seen organizations fall into is making security overly complicated. It's understandable - security as an industry is still relatively new and most of us…
Security – Back to the Basics Series - Part 1

Security – Back to the Basics Series - Part 1

Article 1: You’re Not Alone, We’re All Confused This article is part one of a three part series titled “Security – Back to the Basics”.  The purpose of this series is to take you from a state of confusion about information security…
Vulnerability-Assessment

Internal Network Vulnerability Assessment

FRSecure internal vulnerability assessments determine whether your network is reasonably protected from threats, and if your systems and processes can properly react to such threats.
PCI Concepts for Non-Technical People

PCI Concepts for Non-Technical People

Many small, medium and yes, large businesses struggle to understand the technical jargon that is used by the Payment Card Industry (PCI).  Often-times companies do not have in-house experts trained in PCI and they rely on vendors to help protect…