Aaron Weismann

Aaron Weismann is a healthcare industry CISO with over a decade of strategic management, technology, and information security experience.

penetration testing for SOC 2

Many people wonder: does an SSAE 18 SOC 2 assessment require a penetration test? The answer is a resounding “no.” That being said, there are many good reasons to conduct regular penetration testing. Coordinating that testing with other audit functions promotes economies of scale and may even help with responses to those audits. (NOTE: If …

Does SOC 2 Require a Penetration Test? Not Really. Read More »

SOC 2 type 1 vs type 2

Navigating the SOC audit process can be daunting. There are a few options for audits and while the standards are consistent among auditors, each auditor has their own unique style for conducting the audit. In this article, I’m going to break down the primary distinctions between a SOC 2 Type 1 vs Type 2 audit. …

SOC 2 Type 1 vs Type 2: How to Decide Which is Right Read More »

soc 2 readiness assessment

A SOC 2 readiness assessment, like other kinds of readiness assessments, highlights an organization’s ability to succeed in an assessment against a framework baseline. Readiness assessments are particularly helpful in driving cost savings for assessments, but take time and effort to conduct. In this article, I’ll outline what a SOC 2 readiness assessment is and …

Is a SOC 2 Readiness Assessment Worth It? Comparing Costs & Benefits Read More »

soc 2 certification costs

SOC 2 certifications are a must for many businesses in 2023 and a nice-to-have for many others. It’s become a defacto measure of economic and cybersecurity health because of the quality and extent of the review, and the easy snapshot it provides into organizational, financial, and cybersecurity health. Unfortunately, working out your organization’s potential SOC …

How Much SOC 2 Certification Costs Will Depend on 6 Factors Read More »

data study on identity theft

In which U.S. state is the average resident most likely to have their identity stolen? That’s the question we set out to answer in this data study. Some people think a higher population inevitably leads to higher cases of identity theft. More residents mean more identities to steal. As cybersecurity professionals, we had a different …

The 10 Worst U.S. States For Identity Theft [Data Study] Read More »

worst data breaches by US state

Once again in 2022, the theft of Americans’ data through cyberattacks was consistent. And the moments when the highest number of citizens are at risk, are after corporate data breaches. These incidents that expose thousands – in some cases millions – of people’s personal data to criminals, cannot be studied in enough detail. Are data …

The 10 Worst States in the U.S. for Data Breaches [Data Study] Read More »

The worst healthcare data breaches of all time.

There have been a slew of healthcare organizations that have experienced data breaches over the past decade. Some of those are mundane: misprinted and mismailed information or a phone call to the incorrect recipient. However, as healthcare organizations become increasingly sophisticated and use more technology more often to support operations, errors or attacks against that …

The 10 Worst Healthcare Data Breaches of All Time (U.S) Read More »

HIPAA Risk Assessment

A HIPAA Risk Assessment, or a HIPAA Security Risk Assessment more precisely, is a mandatory requirement for Covered Entities and Business Associates in their HIPAA Security Rule compliance journey. HIPAA Security Risk Assessments can be straightforward, but it’s critical to understand what to review, how, and against what frameworks. Let’s dive into what a HIPAA …

8 Steps to a Proper HIPAA Risk Assessment in 2023 Read More »

HITRUST just released its 11th version of HITRUST cybersecurity framework or HITRUST CSF. One of the major changes in version 11 is the removal of the HITRUST bC assessment and its replacement with the new HITRUST e1. Let’s dive into some high-level information about what the HITRUST e1 assessment is, why an organization would pursue …

Understanding the New HITRUST e1 Essentials Certification Read More »

ePHI for healthcare

When the Health Insurance Portability and Accountability Act of 1996 was first drafted, the internet and electronic data were seen by many as a passing fad. In the 27 years since then, not only has the internet become a major force in most peoples’ lives, electronic Protected Health Information, or ePHI, is the primary modality …

ePHI for Healthcare: Everything You Need to Know in 2023 Read More »

Network Assured on Facebook     Network Assured on Twitter
Copyright © 2022 Network Assured