About Josh Ablett

This author has not yet filled in any details.
So far Josh Ablett has created 43 blog entries.

Hiring a Penetration Testing Service? 14 Questions to Ask a Reference

If you're thinking of hiring a Penetration Testing service, you definitely need to do your due diligence. There's a wide range of services that penetration testing firms offer, ranging from cheap automated scans to manual expert exploit detection. As part of your due diligence process, here are 14 questions that you should consider asking the [...]

By |2019-04-16T18:45:02+00:00December 2nd, 2018|Computer Cyber Security|0 Comments

Should You Sign a HIPAA Business Associate Agreement?

Transcript: Hi there.  A a few months back, a client asked us to speak to a new vendor that they were thinking about doing business with.  The cost of doing business with our client is that they were asking this vendor to sign what's called a HIPAA Business Associate agreement.  If you're watching this video, you're probably [...]

By |2019-01-04T20:06:00+00:00December 2nd, 2018|HIPAA|0 Comments

Is Office 365 HIPAA compliant?

Health care providers must follow the Health Insurance Portability and Accountability Act (HIPAA).  Is Office 365 HIPAA compliant, though? This act protects your patient healthcare data (PHI).  As more clinicians are electronically transmitting patient records and other personal information to specialists and medical facilities, it is imperative that we ensure that information is secure. Isn’t [...]

By |2019-04-05T18:42:53+00:00November 14th, 2018|Cloud Cyber Security, Email Cyber Security, HIPAA|1 Comment

13 Fantastic Resources for Writing an Information Security Policy

So, you need to write an information security policy. And you’re totally overwhelmed. Where do you start? What do you need? What should it entail? You’re not alone. These are questions that we get a lot. It’s totally understandable. Planning, writing, and implementing a security policy can be seriously intimidating. If it’s poorly written or [...]

By |2019-04-16T18:41:23+00:00November 10th, 2018|Computer Cyber Security, HIPAA|1 Comment