Regulations Articles

Stay up to date with the latest articles in Network Security
September 29, 2020

Big Easy state cracks down with MSP Regulation

Two decades ago, Managed Service Providers (MSP) barely existed. Two years ago, there were still a huge number of people […]
May 20, 2016

Shelter from Cyber Regulation: NIST 800-171

Shelter from Cyber Regulation: NIST 800-171

We are seeing more and more laws and regulations that outline the do’s and don’ts of cybersecurity. One in particular is the NIST 800-171 rule.

See how this particular new regulation can affect your cybersecurity business - big or small.

Continue reading

November 17, 2014

HIPAA: How to bend the security rule ‘reasonably’ and ‘appropriately’

Hipaa rules

HIPAA has a long list of "requirements" for IT providers -- but did you know that some of the rules are not as concrete as they seem?

See which parts of HIPAA's security rule gives you some flexibility, and see just how far you can bend the rules before the cracks start to show in your compliance and security.

Continue reading

August 14, 2014

Healthcare IT Security: Compliance nightmare on horizon

Healthcare ITHealthcare IT departments are required to protect patient data under HIPAA -- but a new SANS report shows many health organizations are compromised.

Find out more about what the report calls a "compliance nightmare on the horizon" for healthcare IT security.

Continue reading

July 14, 2014

PCI DSS: Easier and cheaper compliance with SAQs

Swiping Credit Card

Pretend PCI DSS compliance is a highbar. How you handle cardholder data will determine whether you have to throw a small, light portion of your network over the bar or the whole hulking mass of it.

IT service providers can make compliance easier -- but how?

Continue reading

May 5, 2014

HIPAA Hazards: Avoid the business associate trap

HIPAA Hazards

IT providers, do you have clients in healthcare? Do you handle their patient data? If yes, then you are almost certainly required to protect that data by HIPAA.

HIPAA calls this data “electronic protected health information,” or ePHI. Essentially, it is electronic information about a patient. It can be anything from a patient’s phone number to a recent diagnosis.

HIPAA requires healthcare organizations to protect this data. It also requires their “business associates” to protect it – and that includes their IT service providers.

Continue reading

About Us

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology. Our customers do not waste time with security products designed for large enterprises. Instead, we make it easy for SMBs to protect and manage networks of up to 350 users.
call us
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram