Service: BALLAST Risk Assessment Software

Fulford

Burnette

Beware: Myths about Data Security and HIPAA Compliance

A critical first step in putting a compliant data security solution in place is separating fact from fiction. This article covers four common misassumptions you’ll want to know.

HIPAA Security Compliance: How risk tolerant are you?

By going beyond HIPAA security compliance and examining the underlying risks that the controls address, it’s easier to make decisions in an otherwise ‘loosely’ defined set of regulations.

Protect your end users from cyber-attacks

Protecting your company against end-user attacks requires a two-pronged approach. Read the article for a list of steps to take.