Security and Privacy Program Support
Many of our customers periodically need an information security or privacy expert for assistance with answering questions, conducting remediation activitie...
Risk Analysis and Management
Risk analysis and risk management is critical to effectively plan an information security risk management program. The Health Insurance Portability and Acc...
Sample Business Associate Assessment Reports
The tw-Security Solution
Our flexible solution can provide assistance in establishing a BA HIPAA compliance validation process, or using proprietary t...
HIPAA Compliance and Standards
Regulatory compliance is a significant challenge. Most of our customers are faced with multiple compliance requirements that must be addressed with li...
Cybersecurity and Incident Response
The traditional focus of information security is data, applications, and systems through safeguards and controls applied to people, processes, and technolo...
HITECH Business Associates
There is no government approved accreditation process or certifying authority for determining if a business associate is complying with HIPAA. No product o...
Policy, Procedure, and Documentation
Well-written policies, procedures, and the supporting documentation should be written for a specific target audience to provide direction and establ...
Business Impact Analysis
What is a Business Impact Analysis (BIA)?
Identifies the critical applications and systems used within each department
Establishes the Recovery Tim...
Disaster Recovery Planning
The Importance of Disaster Recovery Planning
With a growing dependence on information systems, IT disaster recovery planning is even more essent...
Education, Training, and Awareness
The Ongoing Process of Security Awareness
People are the root cause for most security incidents. Therefore, security awareness and training shou...
Security and Privacy Programs Support Services
The Business Challenge
Securing qualified, experienced, security expertise with the rising demand for cybersecurity professionals is a challenge...
Risk Analysis versus Risk Assessement
A judgment about something based on an understanding of the situation; a method of evaluating performance [high-level]
Biomedical Device Risk Analysis
Biomedical device risk analysis could be a significant undertaking for an organization. tw-Security's consultants are risk analysis experts and extreme...
HIPAA Security Rule
Health Insurance Portability and Accountability Act (HIPAA) - 1996
Proposed Security Rule - August 1998, Final Security Rule - February 2003
Cyber Attack Incident Response Preparedness
The Never Ending Threat
Each week we learn of another data breach, combined with never-ending cybersecurity threats, emphasizing the need to pro...
Cyber Security Update
Cyber Security Key Statistics
There have been a lot of high-profile data breaches1
Hacking continues to be the biggest breach event category, eve...
Reducing Risks of Ransomware Attacks
Ransomware is a specific type of computer virus written by criminals for financial gain. When it infects a computer, ransomware encrypts files on the inter...
asdfasdf asdf afdasdfasdf asdf afdasdfasdf asdf afdasdfasdf asdf afdasdfasdf asdf afdasdfasdf asdf afdasdfasdf asdf afdasdfasdf asdf afdasdfasdf asdf afdas...
Privacy and Breach Management
The Business Challenge
The role of the Privacy Officer continues to grow in importance. Over time we have seen the Privacy Officer take on addit...