Vendor Risk Management Insights

      iconemail-box

      Subscribe to our blog

      Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

      EBA Guidelines on Outsourcing Arrangements - Summary of Requirements

      Outsourcing business functions, including IT and data services, can have many benefits, such as reduced costs, more efficiency and the ability to quickly scale; ...

      HIPAA & HITECH: Third-party Risk Management

      Health information is regarded as highly private data by many individuals. The unauthorized disclosure of health data can, and has, caused individuals to suffer ...

      RiskRecon is Acquired by Mastercard to Enhance Cyber Threat Intelligence

      Mastercard has announced the acquisition of RiskRecon to bolster its cyber threat intelligence portfolio.
      HITECH5

      HIPAA & HITECH | Today's Health Data Privacy Laws in the USA - Part 2

      Breach Notifications HITECH expects organization to take reasonable steps to detect breaches. This means an organization can’t justifiably claim a ...
      healthcare1

      HIPAA & HITECH | Today's Health Data Privacy Laws in the USA - Part 1

      HIPAA & HITECH are major regulations in the healthcare industry in the United States of America. HIPAA was enacted in 1996 and aimed to provide privacy ...
      HITECH2

      HITECH Foundations: Part 2

      In part two of our blog series on HITECH Foundations - we explore a number of key areas including breach notification requirements, restrictions on disclosures and ...
      HITECH1

      HITECH Foundations: Part 1

      This blog continues our series on health data information security & data privacy laws in the United States. This two part blog series will go through the key ...
      Cyber-Incident

      What's a Cyber Ripple Event?

      For some years now security experts have rung the alarm bells over the risk of third-party breaches. Enterprises are starting to understand that the security ...
      healthcare_data_breach

      Healthcare CyberSecurity: HIPAA Foundations - Part 2

      In this part one of our HIPAA foundations blog, ...
      HIPAA-cloud

      Healthcare CyberSecurity: HIPAA Foundations - Part 1

      Health information is regarded as highly private data by many individuals. The unauthorized disclosure of health data can, and has, ...