Network Security

Cisco ASA Firewalls

2020-09-11T12:51:18+00:00Categories: Anti-malware & Firewalls, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

This post is about Cisco Firewalls. It aggregates available information from datasheets published by Cisco. The ASA in Cisco ASA stands for Adaptive Security Appliance. We suggest that you read the following two posts before continuing to read this post: All Things about Firewall Hardware Firewalls In fact, Cisco ASA is a security device that combines [...]

Network Monitoring Tools: Veaam ONE

2020-09-26T09:04:00+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , |

So far, we have introduced and reviewed several software packages for network monitoring in our posts. In this post, we are going to discuss another powerful software package: Veeam ONE. Veeam ONE, part of Veeam Availability Suite, provides comprehensive monitoring and analytics for your backup, virtual and physical environments. Veeam ONE enables real-time monitoring, business [...]

How to Comply with PCI DSS

2020-09-09T06:59:01+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , , , , , , , , |

This post presents How to comply with PCI DSS. This article is a summary from of the pcisecuritystandards.org website. With the following link: PCI DSS Quick Reference Guide For more info please refer to pcisecuritystandards.org We recommend you that before continuing, read this post. Each payment card brand maintains its own separate compliance enforcement programs [...]

Security Controls and Processes for PCI DSS Requirements

2020-09-09T07:03:35+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , , , , |

We already have a post called PCI-DSS that you can read it here. Now, in this post, we are going to get acquainted with the security controls and processes required for a PCI-DSS implementation. This post presents the objectives of PCI DSS and related 12 requirements. This article is a summary from of the pcisecuritystandards.org [...]

HIPAA Privacy Rule- Part 3

2020-09-09T07:04:00+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , |

This post is a summary of key elements of the HIPAA Privacy Rule including who is covered, what information is protected, and how protected health information can be used and disclosed. This article is a summary from of the hhs.gov website. With the following link: Summary of the HIPAA Privacy Rule For more info please refer [...]

HIPAA Privacy Rule- Part 2

2020-09-09T07:05:00+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , |

This post is a summary of key elements of the HIPAA Privacy Rule including who is covered, what information is protected, and how protected health information can be used and disclosed. This article is a summary from of the hhs.gov website. With the following link: Summary of the HIPAA Privacy Rule For more info please refer [...]

HIPAA Privacy Rule- Part 1

2020-09-09T07:05:18+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , , , , , , |

This post is a summary of key elements of the HIPAA Privacy Rule including who is covered, what information is protected, and how protected health information can be used and disclosed. This article is a summary from of the hhs.gov website. With the following link: Summary of the HIPAA Privacy Rule For more info please refer [...]

HIPAA Series Security Standards: Implementation for the Small Provider

2020-09-09T07:06:28+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , , , |

In this post we are going to talk about Implementation for the Small Provider. This post is the seventh post in the HIPAA series. This series of posts is called the HIPAA Series. The series will contain seven post: Security 101 for Covered Entities Security Standards: Administrative Safeguards Security Standards: Physical Safeguards Security Standards: technical [...]

HIPAA Series – Basics of Risk Analysis and Risk Management

2020-09-09T07:06:41+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , , , , , , , , , , |

HIPAA Series - Basics of Risk Analysis and Risk Management In this post we are going to talk about Basics of Risk Analysis and Risk Management. This post is the sixth post in the HIPAA series. This series of posts is called the HIPAA Series. The series will contain seven post: Security 101 for Covered [...]

Go to Top