Schedule Demo

Search

Risk Compliance and Governance Can Be Solved

Risk Compliance “In the wake of several well-publicized corporate scandals about 15 years ago – Enron and WorldCom, to name two – and the passage of the Sarbanes-Oxley Act in 2002, organizations that must adhere to regulations for data security, financial accountability and consumer privacy can’t do without someone making sure internal processes are being…

Technology Solutions to Ensure HIPAA Compliance

In the Healthcare and Life Sciences industries, people’s lives are literally in the hands of others. However, it is not enough to protect only a patient’s physical well-being, their patient information and identity must be protected as well. HIPAA, the Health Insurance Portability and Accountability Act, sets rules and standards for maintaining the privacy and…

3 Reasons Your Practice Should Care About Data Privacy

In the age of digital information, which we certainly are in, it is vital that all medical practices employ suitable best practices and procedures to ensure data privacy. The risk is just too high to ignore these practices. The last thing that your patients should worry about is their health information falling into the hands…

Hospitals Are Just As Vulnerable to Cyber Attacks

Hospitals Are Just As Vulnerable to Cyber Attacks When a company’s systems are hacked, it can have serious financial ramifications. When a hospital falls prey to a cyber attack, it can have devastating consequences to its patients as well. Hollywood Presbyterian Medical Center was just attacked and it’s interfering with their day-to-day operations. Staff at…

The Hack Heard Around the World

The Hack Heard Around the World It was the hack that made cyber security an international story. Sony Pictures Entertainment was attacked just before Thanksgiving in 2014. Their systems were breached, data was stolen, and a treasure trove of damaging and embarrassing company emails was released to the public over the next few months. Sure…

Does Your Audit Board Know How to Review Cyber Security Ops?

Does Your Audit Board Know How to Review Cyber Security Ops? Cyber security is on everyone’s mind these days. Keeping abreast of the latest in cyber crime and how it affects your business is an increasingly difficult job. Your IT department can not do it alone. They need the board’s commitment to cyber security efforts…

Why Regulatory Change Management Should Be Automated

Companies struggle with regulatory compliance in a number of areas. By utilizing an enterprise-wide solution for regulatory change management, companies are able to streamline their operations and control compliance monitoring more effectively. Manage Regulatory Changes A regulatory change management program can be used to keep track of regulatory changes and new requirements offering end-to-end compliance in an…

CFO Perspective: Reducing the Cost of SOX Compliance

By Mark Kissman, CFO, Pathlock Technologies More than a dozen years after the adoption of the Sarbanes-Oxley Act (SOX), we would expect the effort expended by organizations to comply decrease over time. However, according to Protiviti’s 2015 Sarbanes-Oxley Compliance Survey, 67% of the 460 audit executives and professionals polled reported an increase in the hours…

How to Eliminate Manual Controls and Move to Exception-based SoD Monitoring

How to Eliminate Manual Controls and Move to Exception-based SoD Monitoring For many organizations, manual controls still make up a large portion of the framework to mitigate segregation of duties (SoD) issues. Because of this, businesses have little visibility into the true impact to the business. Click on the infographic below to learn how you…