scorecard Archive
hipaa compliance

3rd Party Vendors of Healthcare Providers Must Meet HIPAA Regulations

The Health Insurance Portability and Accountability Act (HIPAA) aims to protect health-related and personal information of individuals, including medical records, health insurance data, SSNs of patients, etc. These information is very valuable and profitable in the blackmarket of dark web. Every year the data theft or extortion through ransomwares become a very big problem for […]
ssl tsl secure connection

How Strong is Your SSL/TLS? 6 Simple Steps to Make it Stronger

Secure Sockets Layer (SSL) protocol and its successor Transport Layer Security (TLS) protocol secure connections between web servers and browsers. If a company’s website requests sensitive data such as credit card information, then SSL/TLS certificate is a must. Especially, e-commerce websites use SSL/TLS to encrypt such information. Do I need an SSL/TLS? SSL/TLS has become […]
cyber security scorecard posture

Cyber Risk Scorecard: A Compact View to Your Cyber Security Posture

Is there a way to see your cyber risk in a compact report? Yes there is, it is called cyber risk scorecard. Many companies use public and private tools to assess their cyber risk, but it requires processing of data gathered from many different sources and analysis and contextualization ın order to convert data to […]
Risk Management

3rd Party Risk Management

3rd Party Risk Management; Many organizations have been talking about the third-party risk management for years and it is becoming more complex every day and attracting a lot of attention from the regulators. Most organizations have direct and/or indirect spendings on multiple vendors across the globe that make risk management more complex due to dealing with […]
cyber scorecard

Cyber Security Risk Scorecard; Are You Safe or Not?

Cyber Security Risk Scorecard; Today, almost all companies, regardless of the size or the sector, need to rate their cyber security risk. A reliable and actionable security scorecard can assess the risks and show the ways to eliminate the threats. Generating a security scorecard does not require your personal or secret information. Because they use […]