What Is Passwordless Authentication?

passwordless authentication featured

Passwords are our oldest form of digital security… and, in most cases, one of the weakest links in identity management and authentication. Phishing, database breaches, and poor digital hygiene have made authentication challenging for security and compliance. They have become the quintessential keys to our online kingdoms.

As cyberattacks grow more sophisticated, there’s a mounting urgency to move beyond traditional passwords. That’s where passwordless authentication comes in. But how does this new approach to technology work in terms of compliance and regulations?

This article will discuss passwordless authentication, its benefits, and how it fits your compliance requirements. 

Read More

How to Determine Cybersecurity Impact Level Using FIPS 199

fips 199 featured

The Federal Information Processing Standard (FIPS) 199 provides organizations and individuals with the necessary guidance to determine a cybersecurity threat’s impact level accurately. These impact levels define the level of security a system should have to protect the data contained therein adequately. 

This article will take you through an overview of FIPS 199 and how it can help you understand the three categories of impact levels, define terms used in FIPS 199, assess the impact of a cybersecurity threat, and provide best practices for interpreting results and mitigating risk. 

 

Read More

Understanding the Difference Between HIPAA and HITRUST

HIPAA vs. HITRUST featured

Within the world of healthcare compliance and information security, there’s been increasing confusion around some terms and organizations. We’ve heard a bit about some of this confusion, specifically around HITRUST and HIPAA. 

Both are connected to the preservation of health information, yet they fulfill separate functions and are founded on differing principles. This article clarifies the differences between these two. Whether a healthcare practitioner or a business associate, this guide will describe where HITRUST fits into overall compliance (if at all). 

 

Read More