Skip to main content
Show submenu for Compliance
Compliance
Gap Assessment
HIPAA & HITRUST
SOC 2 Audit
Tabletop Exercises (TTX)
Virtual CISO (vCISO)
Show submenu for Cybersecurity
Cybersecurity
Penetration Testing
Virtual CISO (vCISO)
Vulnerability Scanning
About
Show submenu for Learning Center
Learning Center
Blog
Contact Us
Open main navigation
Close main navigation
Show submenu for Compliance
Compliance
Compliance
Compliance
Gap Assessment
HIPAA & HITRUST
SOC 2 Audit
Tabletop Exercises (TTX)
Virtual CISO (vCISO)
Show submenu for Cybersecurity
Cybersecurity
Cybersecurity
Penetration Testing
Virtual CISO (vCISO)
Vulnerability Scanning
About
Show submenu for Learning Center
Learning Center
Learning Center
Learning Center
Blog
Contact Us
Talk to an Expert
Talk to an Expert
Blog
Categories
Security Education
Security Tips
Compliance
HIPAA
Privacy
News
SOC 2
Finance
AI
Policy
Insights & Resources
How Every Company Gets Hacked Now... And Nobody Cares Anymore
by
Steve Huffman
on June 02, 2025
It’s the same story every week.
Explore This Topic
All articles
Jun 2, 2025
How Every Company Gets Hacked Now... And Nobody Cares Anymore
Read article
May 21, 2025
Can AI Be HIPAA-Compliant? What You Need to Know
Read article
Apr 4, 2025
Using Dropbox Securely for Financial Documents and Client Data
Read article
Apr 1, 2025
Cybersecurity Training for Bank Employees: Best Practices
Read article
Mar 26, 2025
Cursor IDE vs Windsurf Security
Read article
Mar 25, 2025
Cybersecurity Pitfalls in Trade Reporting: Protect Your Financial Data
Read article
Mar 20, 2025
Toll Payment Scam Alert: What You Need to Know and How to Stay Safe
Read article
Mar 19, 2025
AI & Algorithmic Trading: Key Cybersecurity Risks Regulators Monitor
Read article
Mar 18, 2025
SEC & CFTC Cybersecurity Audits: How to Prepare Before Regulators Knock
Read article
Mar 12, 2025
Compliance for Healthcare Software Without Slowing Down Your Business
Read article
Mar 11, 2025
Healthcare Software Compliance: HIPAA, SOC 2, or ISO 27001?
Read article
Mar 6, 2025
The Essential HIPAA Compliance Tools for IT Teams
Read article
Mar 5, 2025
Hidden Pitfalls of HIPAA Compliance: What You Need to Know
Read article
Mar 4, 2025
The Hidden Dangers of Password Sharing in Healthcare: A HIPAA Risk
Read article
Feb 27, 2025
HIPAA Logging Requirements: Why Failure to Track PHI Access is a Risk
Read article
Feb 26, 2025
HIPAA Violation Examples: Real Cases & Lessons Learned
Read article
Feb 25, 2025
How to Get HIPAA Certified: A Step-by-Step Guide
Read article
Feb 20, 2025
The HIPAA Minimum Necessary Standard: What It Is & How It Applies
Read article
Feb 19, 2025
Who Enforces HIPAA? Understanding Compliance and Penalties
Read article
Feb 18, 2025
Is Google Calendar Reminder HIPAA Compliant? What You Need to Know
Read article
Feb 13, 2025
Beware: These Popular Cloud Services and Tiers Are NOT HIPAA Compliant
Read article
Jan 30, 2025
Navigating Security Risks of China’s DeepSeek AI: Expert Insights
Read article
Jan 29, 2025
Leadership Shifts in U.S. Cybersecurity: Impacts and Future Directions
Read article
Jan 28, 2025
Key Lessons from 2024 Breaches: Strengthen Your Cybersecurity in 2025
Read article
Jan 23, 2025
Kickoff 2025 with a Security Awareness Campaign
Read article
Jan 22, 2025
Disable Location Tracking: Insights from the Latest NSA Warning
Read article
Jan 20, 2025
Why the U.S. Government Wanted to Ban TikTok—and Why It Reversed Course
Read article
Jan 16, 2025
Using Microsoft OneDrive Securely for CCPA Compliance
Read article
Jan 15, 2025
Best Practices for Using WooCommerce Securely with Customer Data
Read article
Jan 14, 2025
Managing Customer Data on Squarespace and Maintaining Privacy
Read article
Jan 9, 2025
Securing PayPal Transactions for Retail Data Security
Read article
Jan 8, 2025
How to Secure Shopify for PCI-DSS Compliance
Read article
Jan 7, 2025
Managing Client Data with Compliance in Google Workspace for Finance
Read article
Jan 2, 2025
Brushing Scams and QR Code Myths: Debunking Misinformation
Read article
Dec 19, 2024
Securing QuickBooks and Accounting Data for Financial Compliance
Read article
Dec 18, 2024
How to Secure Salesforce for PCI-DSS Compliance in Financial Services
Read article
Dec 17, 2024
Securing Microsoft Teams for HIPAA and Patient Privacy
Read article
Dec 12, 2024
Ensuring HIPAA Compliance with Google Workspace
Read article
Dec 11, 2024
Best Practices for Zoom Security in Healthcare
Read article
Dec 10, 2024
What Is Threat Intelligence and How Can It Help?
Read article
Dec 5, 2024
Step-by-Step Guide to Configuring Slack for HIPAA Compliance
Read article
Dec 4, 2024
Cybersecurity Skills Shortage: How AI is Helping to Fill the Gaps
Read article
Dec 3, 2024
What Is Social Engineering and How Can You Defend Against It?
Read article
Dec 3, 2024
Pros and Cons of Cybersecurity Insurance: Is It Right for Your Business?
Read article
Nov 26, 2024
Cybersecurity Implications of the Metaverse: What to Watch Out For
Read article
Nov 21, 2024
Data Privacy for the Everyday User: Simple Steps to Protect Your Data
Read article
Nov 20, 2024
Is Your Smart Home Safe? Securing IoT Devices from Cyber Threats
Read article
Nov 18, 2024
Threat Intelligence for Beginners: Understanding the Basics and Benefits
Read article
Nov 18, 2024
Passwordless Authentication: The Future of Login Security?
Read article
Nov 14, 2024
How to Spot a Scam: The Psychology Behind Cyber Attacks
Read article
Nov 14, 2024
Exploring Zero-Trust Security: Is It Worth the Investment?
Read article
Nov 13, 2024
Cybersecurity Basics for Small Businesses: Where to Start
Read article
Nov 13, 2024
Cyber Hygiene for Remote Workers: Security in a Home Office
Read article
Nov 7, 2024
Ransomware Playbook: What to Do When You’re Attacked
Read article
Nov 7, 2024
Deepfake Technology in Cybersecurity: Threats and Countermeasures
Read article
Nov 4, 2024
Using AI for Effective Cybersecurity Incident Response and Recovery
Read article
Nov 4, 2024
AI-Driven Phishing: Why It's Hard to Spot & How to Stay Safe
Read article
Nov 1, 2024
The Penetration Testing Process: A Step-by-Step Guide
Read article
Nov 1, 2024
What Is Wireless Penetration Testing and Why Is It Important?
Read article
Nov 1, 2024
What Is Web App Penetration Testing and Why Is It Essential?
Read article
Oct 31, 2024
What to Expect in a Sample Penetration Testing Report
Read article
Oct 31, 2024
Penetration Testing Pricing: What to Expect and How to Budget
Read article
Oct 31, 2024
BCP vs DRP: Differences and Importance for Business Continuity
Read article
Oct 30, 2024
Key Differences Between Vulnerability Assessment & Penetration Testing
Read article
Oct 30, 2024
Securing Slack for GDPR Compliance and Data Privacy
Read article
Oct 28, 2024
CISO as a Service: Enhancing Cybersecurity with On-Demand Expertise
Read article
Oct 28, 2024
Physical Penetration Testing: Enhancing Security with Access Control Checks
Read article
Oct 22, 2024
What Is a Cyber Background Check and Why It’s Essential for Cybersecurity
Read article
Oct 22, 2024
The Benefits of Hiring a Virtual Chief Information Security Officer (vCISO)
Read article
Oct 22, 2024
Virtual Solutions: The Future of Business Continuity Planning
Read article
Oct 21, 2024
Data Loss Prevention Best Practices: Protecting Sensitive Information
Read article
Oct 21, 2024
AI Acceptable Use Policy: Guidelines for Responsible AI Usage
Read article
Oct 18, 2024
5 Common Cybersecurity Myths Debunked
Read article
Oct 14, 2024
Life as a SOC Analyst: Roles, Challenges, and Daily Responsibilities
Read article
Oct 14, 2024
Integrating Security into DevOps: The Power of DevSecOps
Read article
Oct 11, 2024
How to Prevent Password Sharing in Healthcare: Protect Sensitive Data
Read article
Oct 10, 2024
The Importance of Business Impact Analysis (BIA) in Cybersecurity
Read article
Oct 10, 2024
What Is a Fractional CISO? The Cost-Effective Way to Secure Your Business
Read article
Oct 7, 2024
Building a Strong Risk Assessment Policy for Cybersecurity
Read article
Oct 7, 2024
What Is a POAM? A Guide to Understanding Plan of Action and Milestones
Read article
Oct 7, 2024
Assessing Network Security: Key Steps to Protect Your Business
Read article
Oct 7, 2024
What Is Credential Harvesting Malware and How to Protect Yourself
Read article
Oct 4, 2024
Beware of QR Code Scams: How They Work and How to Stay Safe
Read article
Oct 4, 2024
Cybersecurity Awareness Month: History and Why It Matters
Read article
Sep 17, 2024
Assessing Network Security: A Guide to Protecting Your Infrastructure
Read article
Sep 17, 2024
What Does PHI Stand For? Understanding Protected Health Information
Read article
Sep 10, 2024
Penetration Testing in SOC 2 Compliance: What You Need to Know
Read article
Sep 10, 2024
Point of Contact in Penetration Testing: Key Responsibilities Explained
Read article
Sep 9, 2024
Why is Cloud Penetration Testing Important?
Read article
Sep 9, 2024
Top Cybersecurity Tools for Remote Startups: Protect Distributed Teams
Read article
Sep 9, 2024
What Is HIPAA Certification? A Guide for Healthcare Providers
Read article
Sep 6, 2024
Making a Company HIPAA Compliant: A Step-by-Step Guide
Read article
Sep 5, 2024
Is Microsoft Teams HIPAA Compliant? What Healthcare Organizations Need to Know
Read article
Sep 5, 2024
What is the Primary Purpose of Penetration Testing?
Read article
Sep 3, 2024
FedRAMP vs. CMMC: Key Differences & Organizational Implications
Read article
Aug 30, 2024
Continuous Attack Surface Testing: A Key to Modern Cybersecurity
Read article
Aug 30, 2024
Accelerate Regulatory Compliance: Key Strategies for Success
Read article
Aug 29, 2024
5 Warning Signs You Have Poor Cybersecurity; And How to Fix Them Today
Read article
Aug 27, 2024
How to Develop an Effective Physical Security Policy
Read article
Aug 22, 2024
Understanding PCI Gap Assessment: Why It's Crucial for Your Business
Read article
Aug 20, 2024
The Key Role of an ISO 27001 Consultant in Securing Your Business
Read article
Aug 16, 2024
How to Freeze Your Credit: A Step-by-Step Guide
Read article
Aug 15, 2024
Massive Data Breach Exposes Social Security Numbers of Millions
Read article
Aug 13, 2024
Harnessing AI for Tech Startups: Ensuring Strong Cybersecurity
Read article
Aug 12, 2024
Comparing Password Managers: LastPass vs 1Password vs Bitwarden
Read article
Aug 9, 2024
Best Password Manager for Seniors: Simplifying Security
Read article
Aug 8, 2024
HIPAA Safeguards: Ensuring the Security of ePHI
Read article
Aug 7, 2024
How to Use a WiFi Password Generator for Enhanced Network Security
Read article
Aug 6, 2024
Cloud Penetration Testing for Applications: Securing Custom and SaaS Solutions
Read article
Aug 5, 2024
Challenges in Securing Remote Startups and BYOD
Read article
Jul 30, 2024
A Comprehensive Guide to CCSFP Certification
Read article
Jul 30, 2024
vCISO Pricing: How Much Do Customers Typically Pay?
Read article
Jul 29, 2024
Understanding HITRUST Certification Cost: What to Expect
Read article
Jul 27, 2024
The Ultimate Guide to Implementing a Vulnerability Scanning Standard
Read article
Jul 26, 2024
Comprehensive Guide to Incident Response Plan Testing
Read article
Jul 26, 2024
How Can an Attacker Execute Malware Through a Script?
Read article
Jul 26, 2024
Global View of DFARS Compliance: Countries Meeting DFARS Standards
Read article
Jul 24, 2024
Understanding the Differences Between ISO 27001 and SOC 2 Type 2
Read article
Jul 24, 2024
SOC 2 Compliance - A Comprehensive Guide
Read article
Jul 12, 2024
The AT&T Breach: Highlighting the Importance of Third-Party Security
Read article
Jul 2, 2024
Ransomware Prevention
Read article
Jul 2, 2024
What the New GDPR Changes Mean for Your Business in 2024
Read article
Jun 26, 2024
Key Differences Between ISO 27001:2013 and ISO 27001:2022
Read article
Jun 25, 2024
Key Gotchas to Watch Out for in Your GDPR Compliance Journey
Read article
Jun 24, 2024
ChatGPT Unleashed: Security
Read article
Jun 21, 2024
HIPAA Compliance: Covered Entities vs Business Associates Explained
Read article
Feb 22, 2024
Password Length vs Complexity
Read article
Feb 21, 2024
Have You Been Hacked?
Read article
Feb 21, 2024
Cloud Security Tips
Read article
Feb 21, 2024
Reasons Your Company Needs an IT Risk Assessment
Read article
Feb 19, 2024
SOC 2 Timeline
Read article
Feb 19, 2024
Boosting Security Measures: The Importance of 2FA
Read article
Apr 28, 2021
Pass the CISSP for $100
Read article