Know what a HIPAA auditor will ask for before they show up. A tier-by-tier breakdown of the security evidence that separates audit-ready organizations from the rest.
Resources
Blog
Policy and Best Practices
Keep up to date with the latest offensive security news, knowledge, and resources.
Your EHR vendor’s security gap is your HIPAA liability. Learn how third-party health IT risk exposes covered entities and what a mature vendor risk program requires.
Learn what DORA’s TLPT assessment requires, why most organizations fail on preparation (not vulnerabilities), and how to build a TLPT-ready security program.
Preparing for a penetration test? This checklist will inform you on what to expect and what steps you should take to get the most out of your organization’s upcoming pentest.
A vulnerability assessment identifies and evaluates potential security weaknesses in an organization's systems.
Pretexting is a social engineering attack where the attacker fabricates a scenario (or pretext) to manipulate the target into divulging personal information.