Information security

Home/Tag:Information security

Security Controls and Processes for PCI DSS Requirements

2020-09-09T07:03:35+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , , , , |

We already have a post called PCI-DSS that you can read it here. Now, in this post, we are going to get acquainted with the security controls and processes required for a PCI-DSS implementation. This post presents the objectives of PCI DSS and related 12 requirements. This article is a summary from of the pcisecuritystandards.org [...]

HIPAA Privacy Rule- Part 3

2020-09-09T07:04:00+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , |

This post is a summary of key elements of the HIPAA Privacy Rule including who is covered, what information is protected, and how protected health information can be used and disclosed. This article is a summary from of the hhs.gov website. With the following link: Summary of the HIPAA Privacy Rule For more info please refer [...]

HIPAA Privacy Rule- Part 2

2020-09-09T07:05:00+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , |

This post is a summary of key elements of the HIPAA Privacy Rule including who is covered, what information is protected, and how protected health information can be used and disclosed. This article is a summary from of the hhs.gov website. With the following link: Summary of the HIPAA Privacy Rule For more info please refer [...]

HIPAA Series – Security Standards: Organizational, Policies and Procedures and Documentation Requirements

2020-09-09T07:06:55+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , , |

In this post we are going to talk about Organizational, Policies and Procedures and Documentation Requirements. This post is the Fifth post in the HIPAA series. This series of posts is called the HIPAA Series. The series will contain seven post: Security 101 for Covered Entities Security Standards: Administrative Safeguards Security Standards: Physical Safeguards Security [...]

HIPAA Series – Security Standards: Technical Safeguards

2020-09-09T07:07:08+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , , , , , , , |

In this post we are going to talk about technical Safeguards. This post is the fourth post in the HIPAA series. This series of posts is called the HIPAA Series. The series will contain seven post: Security 101 for Covered Entities Security Standards: Administrative Safeguards Security Standards: Physical Safeguards Security Standards: technical Safeguards Security Standards- [...]

HIPAA Series – Security Standards: Physical Safeguards

2020-09-09T07:07:25+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , , , , , , , , |

In this post we are going to talk about Physical Safeguards. This post is the third post in the HIPAA series. This series of posts is called the HIPAA Series. The series will contain seven post: Security 101 for Covered Entities Security Standards: Administrative Safeguards Security Standards: Physical Safeguards Security Standards: technical Safeguards Security Standards- [...]

Cyber Security

2020-09-23T13:18:18+00:00Categories: Certified Ethical Hacker, Network Security|Tags: , , , , , , , , , |

Cyber security is the practice of protecting systems, networks, and programs from digital attacks. It's also known as information technology security or electronic information security. Cyber-attacks are often aimed at accessing, changing, or destroying sensitive information. Final goal of these attacks is extorting money from users, or interrupting normal business processes in organizations, governments and [...]

Go to Top