In this blog we discuss when you can text patients, what the regulations are, and the appropriate reasons and times for texting. We will also be discussing the advantages of using a texting service.
Organizations should identify the roles assigned to each statement within the policy. Mapping policy commitments to requirements and roles creates a shared responsibility matrix.
In this blog we explore exactly what spam is, and how it compares to other forms of malware. Specifically, how it compares to phishing, as the two methods of social engineering are so similar.
Having all of these hands on deck now complicates things a bit when it comes to responsibilities and safeguards. So who exactly holds the responsibility for protecting CUI? And how should one go about it? Let’s get into it!
Who should or shouldn’t have access to CUI? To answer this, we must look at the laws and regulations that govern access to CUI. There are specific controls that protect unauthorized disclosure.