News

PHI Guardians: Workforce members who are authorized to create or store ePHI or who are responsible for distributed or multi-user systems that are used to store or transmit ePHI have the following ...
ITRA covers Sections 2 and 5 of the Security Standard for the Solutions Life Cycle Management (SLCM) process. You can find a link to the Security Standard: Solutions Life Cycle Management process in ...
What is Vulnerability Management? Vulnerability management is a continuous, proactive process of identifying, evaluating, and ...
As companies continue the push toward greater productivity and efficiency, they must ensure security doesn't get in the way, even as it takes center stage.
Organizations of all sizes utilize dozens to hundreds and even thousands of endpoints to manage operations effectively.
Key management is the process of protecting, tracking, and scheduling mechanical keys. Why is this important? Because the key carries access to sensitive locations and assets within the organisation, ...
FISMA is the Federal Information Security Management Act of 2002 ... party FISMA-compliant data processing/storage facility is used or extraordinary data process is needed. Additional work load due to ...
Vulnerability Management program, governed by the Information Security Office, is an initiative to manage Information and Networked Systems vulnerabilities for University Schools and Departments. This ...