Articles

Top 8 Security Risk Assessment Findings

We conduct dozens of security risk assessments for clients each year. It’s not surprising that we see a common pattern of issues among many of the organizations.  Below is a description of these issues and what you can do to manage the risk associated with them. ...

How to Build and Information Security Program

Executives and board members are slowly but surely starting to realize that information security efforts need to become a priority.  Current efforts to protect information are now subject to more scrutiny by their customers, insurance companies and the government....

Avoid a Security Audit, Conduct an Assessment in 5 steps

The term “security audit” is often used synonymously with security risk assessment and risk analysis. But a security audit for HIPAA compliance is when Health and Human Services (HHS) audits a covered entity or business associate to determine their level of compliance...

FISASCORE

FISASCORE is a comprehensive, risk-based measurement of information security assigned to your company based on a proven and thorough assessment process. Once completed, it will identify critical vulnerabilities, control gaps/ deficiencies, and applicable threats to...

NorthStar Hires Brandon Haggerty, CISSP, GCWN

Brandon Haggerty, CISSP, GCWN Director of Security and Professional Services BA St John’s University MS Minnesota State University – Mankato NorthStar is pleased to announce that Brandon Haggerty, CISSP has joined NorthStar in a full-time capacity as of September...

4 Types of Information Security Threats

No matter how long you have been dealing with HIPAA there are probably some parts you just don’t get.  In the end, the HIPAA Security Rule exists to prevent bad stuff from happening.  So what is your risk of bad stuff happening?  That’s the purpose of one of the HIPAA...

Let Us Help You Down the Path of Information Security

Get More Information Today