The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

What is a HIPAA security risk assessment, and who needs one?

What is a HIPAA security risk assessment, and who needs one?

March, 2023 | Foster Charles

The healthcare sector is a favorite target for cybercriminals and state-sponsored hackers. Contrary to popular belief, things like stolen medical records are worth far more on the dark web than [...]

How A Cybersecurity Audit Can Reveal Your Cyber Readiness

How A Cybersecurity Audit Can Reveal Your Cyber Readiness

February, 2023 | Foster Charles

When was the last time you had a cybersecurity audit? If it takes you more than a few seconds to think back, odds are it’s been too long. As your business becomes more reliant on technology to manage [...]

Risk Assessments with vCISO Services

Risk Assessments with vCISO Services

May, 2022 | Foster Charles

To overcome increasingly sophisticated cyberattacks, today's businesses need robust cyber defenses. This is why enterprises usually have a chief information security officer (CISO) who's in charge of [...]

A Guide to NIST CSF Controls

A Guide to NIST CSF Controls

October, 2021 | Foster Charles

The NIST Cybersecurity Framework is a globally recognized set of best security practices and guidelines. Although compliance is voluntary, and the framework provides much flexibility over how [...]

What should you expect from a HIPAA security risk assessment?

What should you expect from a HIPAA security risk assessment?

March, 2021 | Foster Charles

A HIPAA security risk assessment is an essential component of achieving and maintaining full compliance with the federal law. Every covered entity and business associate should conduct periodic risk [...]

Why you can’t afford to make a mistake when performing a HIPAA risk assessment

Why you can’t afford to make a mistake when performing a HIPAA risk assessment

March, 2021 | Foster Charles

Healthcare is a favorite target of cybercriminals due to the high value of personally identifiable information on the black market. One of the main tenets of the HIPAA security rule is that covered [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”