Business Impact Analysis

Business Impact Analysis You have heard of a business continuity plan, but you may hear less frequently about one of its important components: the business impact analysis. A business impact analysis is the step where you make an inventory of the what business functions or assets would be impacted by any major negative events that […]

Risk Assessment

Risk Assessment Before you can begin making any specific plans to handle a major event which threatens your firm’s capacity to do business, an analysis of the threats and hazards in the environment needs to be put together. This first step is known as a risk assessment. It details the hazards that have the potential […]

Signs You Aren’t Budgeting Enough for IT

Many businesses looking to bounce back from the pandemic are struggling with tight budgets. Still, technology can improve remote work, increase productivity, and enhance customer satisfaction.

What is a business continuity plan?

What is a business continuity plan? You may hear a lot about business continuity plans and may even hear them incorrectly referred to as disaster recovery plans. What is a business continuity plan?A business continuity plan is a total blueprint for how a business or organization ensures that its output–products or services–will continue to be […]

Everyone Plays a Role in Cybersecurity

Phishing remains a primary way to attack. A scammer sends an email that looks legitimate, and an unsuspecting victim clicks on a malicious link. They might download malware or end up on a webpage that looks credible but is set up to gather their personal data.

The threats out there: Have you considered their impact?

The threats out there: Have you considered their impact? Oct 28, 2012–Hurricane Sandy hit New York, America’s largest city. The consequences were disastrous and resulted in a shutdown of a city of 8.6 million people. Places that weren’t supposed to ever close, such as major hospitals, had to be evacuated. It was from the intense […]

Free HIPPA Checklist

Managing security in the healthcare world is no easy task.​  Healthcare leaders are facing new technical and security challenges in the wake of ransomware attacks that have hit the industry, as well as the COVID-19 induced shift to remote and hybrid-remote workforces.This checklist is designed to help make sure that you and your team is in compliance. […]

Network Intrusions and Ransomware Attacks Overtake Phishing as Main Breach Cause

Network intrusion incidents have overtaken phishing as the leading cause of healthcare data security incidents, which has been the main cause of data breaches for the past 5 years. In 2020, 58% of the security incidents dealt with by BakerHostetler’s Digitial Assets and Data Management (DADM) Practice Group were network intrusions, most commonly involving the […]

Let's Talk...

SCHEDULE A GETTING TO
KNOW YOU
CALL TODAY

Give us a call at (504) 262-1234 or complete the form below and we’ll follow up with contact details for your call.