Skip to content

Security Insights

Explore insights and recommendations by security experts from the world of cybersecurity

Complying with HIPAA

The Health Insurance Portability and Accountability Act (HIPAA), enacted in 1996, is a U.S. federal law designed to protect PHI and other sensitive patient health information. HIPAA establishes the standards…

What is the Federal Trade Commission (FTC) Act?

The Federal Trade Commission Act (FTC Act) was established in 1914 with the goal of promoting fair competition, preventing deceptive practices, and safeguarding consumers. The FTC Act empowers the Federal…

Cybersecurity Checklist for Startups

Cybersecurity is a critical concern for startups, which often handle sensitive data but may lack the robust security infrastructure of larger corporations. Even a single security breach can lead to…

What is the HIPAA Security rule?

The HIPAA Security rule applies to covered entities, business associates, subcontractors – anyone or any system with access to confidential patient data. Every organization in the healthcare delivery ecosystem must…

Security Certifications for Startups

Investing in security certifications such as SOC 2 and ISO 27001 can benefit startups by bolstering their market credibility and competitive stance. For new companies, establishing trust with potential clients…

Top 3 Security Certifications for SaaS Providers

SaaS providers operate in a digital-first landscape where trust is paramount. To thrive, they must not only offer innovative solutions but also demonstrate uncompromising data security. Achieving certifications like SOC…

SOC 2 for SaaS Providers

If you are a SaaS platform provider, it is increasingly important to demonstrate your security and privacy implementations through a third-party independent audit report, such as SOC 2. A SOC…

Security Considerations for AI in Radiology

As the integration of Artificial Intelligence (AI) into radiology continues to advance, it brings forth a multitude of opportunities to enhance diagnostic accuracy, streamline workflows, and improve patient outcomes. However,…

SOC 2 for Radiology

While a SOC 2 report is often associated with technology companies and cloud service providers, its principles are equally applicable and beneficial to organizations in the healthcare sector, including radiology…

NEN 7510: A Guide to Healthcare Information Security in the Netherlands

When a ransomware attack hit Maastricht University in December 2019, the entire digital infrastructure collapsed. Nineteen thousand students couldn’t access course materials, researchers faced looming grant deadlines with no access
Read More

Understanding the CAIQ

Is CAIQ for You? Are you evaluating cloud service providers and drowning in security questionnaires? Do you need to prove your cloud vendor did their due diligence before the next
Read More

NIST SP 800-53 – The Gold Standard for Cybersecurity

Have You Ever Wondered What Keeps Federal Systems Secure in an Age of Escalating Cyber Threats? Picture this: It’s 2:00 AM, and a federal agency discovers a data breach. Critical
Read More

Securing CUI with NIST SP 800-171 Revision 2

NIST SP 800-171 Revision 2 stands as the mandatory cybersecurity standard for any organization handling Controlled Unclassified Information (CUI) under federal contracts. This isn’t voluntary guidance or a best-practice recommendation.
Read More

Building a Practical Cybersecurity Program with NIST CSF

How do you build a cybersecurity program that’s both comprehensive and practical- without breaking the bank or overwhelming your team? The answer lies in a framework that strips away complexity
Read More

Understanding the NIST AI Risk Management Framework

The question isn’t whether AI will transform your business—it’s whether you’ll manage the risks before they manage you. Every day, AI systems make thousands of decisions that affect real people:
Read More

How to Complete Your Security Risk Analysis for MIPS in 2025

MIPS or the Merit-based Incentive Payment System is a performance-based reimbursement program under Medicare, developed by the Centers for Medicare & Medicaid Services (CMS) to reward healthcare providers for quality,
Read More

How to Prepare for your CMMC Certification

You’ve spent months implementing security controls. Your policies are polished. Your System Security Plan (SSP) is complete. Now comes the moment of truth: the official CMMC assessment. For many defense
Read More

Your CMMC Roadmap

The path to CMMC compliance doesn’t have to feel like navigating uncharted territory. With CMMC requirements entering new DoD contracts and full implementation approaching rapidly, your organization needs a clear
Read More

Trusted by Hundreds of Companies

Do you want to become a databrackets Consultant?

We Are Here to Help You