Technical Compliance
PCI & HIPAA
The fines for non-compliance with PCI and HIPAA are well-known, and substantial. There are also penalties for not having a credible compliance plan in place. All compliance plans are not created equal. Handing a checklist to a staff member and asking them to fill it out does not constitute a credible compliance plan.
With over 25 years of IT experience and 13 years dedicated to HIPAA, we bring to you the expertise required to implement a credible compliance plan. We bring a complete turnkey solution to your practice.
Info Security Forms
Based on industry standard best practices from ITIL and SANS, we can help your company tailor policies that cover many common IT-related areas, such as:
- Acceptable Encryption Policy
- Acceptable Use Policy
- Acquisition Assessment Policy
- Analog/ISDN Line Security Policy
- Anti-Virus Guidelines
- Automatically Forwarded Email Policy
- Bluetooth Baseline Requirements Policy
- Communications Equipment Policy
- Cyber Security Incident Communication Log
- Cyber Security Incident Form Checklist
- Cyber Security Incident Initial System Triage
- Cyber Security Incident Recovery
- Data Breach Response Policy
- Database Credentials Policy
- Dial In Access Policy
- Digital Signature Acceptance Policy
- Disaster Recovery Plan Policy
- DMZ Lab Security Policy
- Email Policy
- Email Retention Policy
- Employee Internet Use Monitoring and Filtering Policy
- End User Encryption Key Protection Plan
- Ethics Policy
- Extranet Policy
- Incident Handling – Chain Of Custody Form
- Incident Handling Forms – Cyber Security Incident Containment
- Incident Handling Forms – Cyber Security Incident Response Contact Details
- Incident Handling Forms – Cyber Security Incident Response Incident Summary
- Information Logging Standard
- Intellectual Property Incident Handling Forms – Incident Communication Log
- Intellectual Property Incident Handling Forms – Incident Contact List
- Intellectual Property Incident Handling Forms – Incident Containment
- Intellectual Property Incident Handling Forms – Incident Form Checklist
- Intellectual Property Incident Handling Forms – Incident Identification
- Intellectual Property Incident Handling Forms – Incident Recovery
- Internet DMZ Equipment Policy
- Internet Usage Policy
- Lab Anti Virus Policy
- Lab Security Policy
- Mobile Device Encryption Policy
- Mobile Employee Endpoint Responsibility Policy
- Pandemic Response Planning Policy
- Password Construction Guidelines
- Password Protection Policy
- Personal Communication Devices and Voicemail Policy
- Remote Access Mobile Computing Storage
- Remote Access Policy
- Remote Access Tools Policy
- Removable Media Policy
- Risk Assessment Policy
- Router and Switch Security Policy
- Security Response Plan Policy
- Server Audit Policy
- Server Malware Protection Policy
- Server Security Policy
- Social Engineering Awareness Policy
- Software Installation Policy
- Technology Equipment Disposal Policy
- Virtual Private Network Policy
- Web Application Security Policy
- Wireless Communication Policy
- Wireless Communication Standard
- Workstation Security (For HIPAA) Policy