Close

Latest news

HIPAA Security Rule Toolkit

HIPAA Security Rule Toolkit

HIPAA Security Rule Toolkit   The NIST HIPAA Security Toolkit Application is intended to help organizations better understand the requirements of the HIPAA Security Rule, implement those requirements, and assess those implementations in their operational environment. Target users include, but are not limited to, HIPAA covered entities, business associates, and […]

Read More

Sec Tools – network security – Pen Testing

Useful sec tools and pen testing software for network admins and I.T. Professionals http://sectools.org/tag/new/ Full disclosure mailing list is back — Improving network security through full disclosure This list is run by and for the network security community. Moderation is performed by a team of volunteers using our moderation guidelines. […]

Read More

IT Disaster Recovery Plan

IT Disaster Recovery Plan

IT Disaster Recovery Plan Businesses use information technology to quickly and effectively process information. Employees use electronic mail and Voice Over Internet Protocol (VOIP) telephone systems to communicate. Electronic data interchange (EDI) is used to transmit data including orders and payments from one company to another. Servers process information and […]

Read More