Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    EBA Guidelines on Outsourcing Arrangements - Summary of Requirements

    Outsourcing business functions, including IT and data services, can have many benefits, such as reduced costs, more efficiency and the ability to quickly scale; however, outsourcing poses security ...
    third-party risk management

    HIPAA & HITECH: Third-party Risk Management

    Health information is regarded as highly private data by many individuals. The unauthorized disclosure of health data can, and has, caused individuals to suffer personal embarrassment, identity ...

    RiskRecon is Acquired by Mastercard to Enhance Cyber Threat Intelligence

    Mastercard has announced the acquisition of RiskRecon to bolster its cyber threat intelligence portfolio.
    HITECH5

    HIPAA & HITECH | Today's Health Data Privacy Laws in the USA - Part 2

    Breach Notifications HITECH expects organization to take reasonable steps to detect breaches. This means an organization can’t justifiably claim a notification wasn’t made because the ...
    healthcare1

    HIPAA & HITECH | Today's Health Data Privacy Laws in the USA - Part 1

    HIPAA & HITECH are major regulations in the healthcare industry in the United States of America. HIPAA was enacted in 1996 and aimed to provide privacy protections related to individuals’ ...
    HITECH2

    HITECH Foundations: Part 2

    In part two of our blog series on HITECH Foundations - we explore a number of key areas including breach notification requirements, restrictions on disclosures and fines related to HITECH ...
    HITECH1

    HITECH Foundations: Part 1

    This blog continues our series on health data information security & data privacy laws in the United States. This two part blog series will go through the key areas that you need to focus on ...
    Cyber-Incident

    What's a Cyber Ripple Event?

    For some years now security experts have rung the alarm bells over the risk of third-party breaches. Enterprises are starting to understand that the security weaknesses at third parties with whom ...
    healthcare_data_breach

    Healthcare CyberSecurity: HIPAA Foundations - Part 2

    In this part one of our HIPAA foundations blog, w
    HIPAA-cloud

    Healthcare CyberSecurity: HIPAA Foundations - Part 1

    Health information is regarded as highly private data by many individuals. The unauthorized disclosure of health data can, and has, caused individuals to suffer ...