Documenting your cybersecurity policies and procedures is a sure way to demonstrate your efforts to clients and regulatory bodies; it’s not just a good way to communicate the rules to employees.
See how this civil engineering firm leveraged GreyCastle Security’s knowledge and practice by having our experts craft custom policies for their business goals.
If you don’t have the time or expertise to develop and manage a cybersecurity program in-house, outsourcing to experts can be the best use of your resources.
Read on to discover how a beleaguered community college CIO built a comprehensive security program with the help of her dedicated virtual CISO from GreyCastle Security.
Data Classification and Asset Inventory should be a foundational part of your cybersecurity program. The first step in protecting your data is knowing what you’re protecting.
Download this anonymized case study on how a healthcare technology company took their cybersecurity program from nothing to fully HIPAA-compliant with a data classification exercise.
Healthcare institutions around the world have become somewhat of a sitting duck for cyber attackers to pounce. With the amount of sensitive, personally identifiable data at stake, risk management in healthcare is a shared responsibility of increasing importance.
After all, the “bad guys” only have to get one thing right, one time —while the “good guys” have to get everything right, every time. When long-time customer, Oswego Health, came up on their annual HIPAA risk assessment requirement, they looked to GreyCastle Security to lead them through the process.
GreyCastle Security responded to the largest ransomware attack in history at a level 1 trauma center in Buffalo, New York. The ransom payout was exactly zero dollars - but is this a zero-sum game?
While the impact from this vicious ransomware attack was unprecedented, most experts agree that Erie County Medical Center’s response was monumental – helping the organization avoid months of downtime and millions of dollars in losses.