Is Your Healthcare Prepared for Ransomware’s Evolving Threats?
A faceless attacker infiltrates a company’s computer network … encrypts its data … and suddenly … ‘access denied.’ No one can retrieve...
Read moreLatest Articles
A faceless attacker infiltrates a company’s computer network … encrypts its data … and suddenly … ‘access denied.’ No one can retrieve...
Read more“Be proactive, not reactive, for an apparently insignificant issue ignored today can spawn tomorrow’s catastrophe.” ~ Author Ken Poirot ...
Read moreWho doesn’t like a little DIY? You save a little money. You get bragging rights. You may even learn a thing or two. But there’s always that...
Read moreCould one of your employees compromise your organization’s cybersecurity during the holidays?
Read moreWe recently conducted a webinar focused on helping covered entities untangle recent changes within the 21st Century Cures Act. Here are...
Read morePhishing, Vishing, and Smishing, Oh My!
Read moreWelcome to the Getting to Know You series from Genzeon and CompliancePro Solutions. We will be interviewing members from across these...
Read moreSeek an Experienced Partner to Build a Roadmap for Department of Defense Cybersecurity Compliance Managing the changes to HIPAA and...
Read moreKelly McLendon will be speaking at fivelocal AHIMA events this year. If you are attending any of these events, please be sure to check out...
Read moreOriginally posted on the Talking About PHI Podcast page from CV Strategic Marketing.
Read more