In this blog we discuss when you can text patients, what the regulations are, and the appropriate reasons and times for texting. We will also be discussing the advantages of using a texting service.
Organizations should identify the roles assigned to each statement within the policy. Mapping policy commitments to requirements and roles creates a shared responsibility matrix.
In this blog we explore exactly what spam is, and how it compares to other forms of malware. Specifically, how it compares to phishing, as the two methods of social engineering are so similar.
In May 2024, the NIST published revision 3 of Special Publication (SP) 800-171. Revision 3 supersedes Revision 2 published in early 2020 and updated in early 2021. Let’s breakdown a mapping of this revision to revision 2.
NIST SP 800-171 prescribes 110 security requirements to protect the confidentiality of data. NIST SP 800-171A details 320 assessment procedures for these security requirements. The following blog explores in detail the first security requirement 3.1.1.
This blog will focus on the following topics; crosswalk methodology, key changes in the update to NIST SP 800-171 Rev 3, organizational defined parameters (ODPs), and applicability.
The National Institute for Standards and Technology (NIST) publishes pioneering cybersecurity standards. In this blog, we look at two of their well known special publications (SP) and discuss: