The decision to start working for Garland Heart was a no brainer for me. I was asked to join our HeartBeat Committee which portrays some of the things in my personal life I am passionate about; volunteering and serving the community. Knowing that Garland Heart has a committee that focuses on just that brought a smile to my face. Not only have I
We understand the budget restraints and "rabbit hole" you can get yourself into regarding compliance and security. How much do I do before the cost outweighs the benefit?
Oftentimes while onsite with our clients we find ourselves discussing the balance between regulations or minimum standards compared to industry best practices or trends. They
We are excited to kickoff a series of videos that will give our audience insight to what life looks like at Garland Heart. We want to share things such as:
For many years, financial institutions have understood the importance of having a strong cyber security strategy. As they handle valuable financial information and other sensitive data, these institutions have long been very attractive targets for hackers. As a result, they know they have to work hard to keep their customers’ accounts and data
As a healthcare provider, it’s essential that your information security is top notch. The Health Insurance Portability and Accountability Act (HIPAA) requires all organizations in the healthcare industry to take steps to keep their patient data safe. Are you doing enough to prevent a breach?
If you have any doubts about the security of your IT
How likely is it that your financial institution will experience a data breach in the near future? Can you even be certain that you haven’t already experienced a data breach? Most importantly, do you know how you would respond if you discovered that a breach had occurred? A breach assessment can help you answer these questions. What you discover
Service organization reports (SOC) are vital to businesses. These internal reports let organizations know about the risks associated with outsourced services. They help to establish regulatory compliance and are an extremely important part of any cybersecurity audit. Organizations use SOC reporting to reveal vulnerabilities in their current