April 20, 2026
Medical practice IT, HIPAA safeguards in 60 to 90 days
A practical 60 to 90 day plan for medical practices to bring HIPAA Security Rule safeguards to a defensible baseline, from risk analysis to access controls to incident response.
April 20, 2026
Security marketing vs. security evidence
Why enterprise buyers, auditors and cyber insurance underwriters discount marketing language in security questionnaires, and what audit-grade evidence actually looks like.
April 20, 2026
How to build a cybersecurity program document your customers accept
The contents, structure and maintenance cadence for a cybersecurity program document that holds up to customer audits, cyber insurance renewals and SOC 2 readiness assessments.
April 20, 2026
Cybersecurity for community banks and credit unions, the examiner's list
What FDIC, OCC, NCUA and state examiners actually look at when they review a community bank or credit union's cybersecurity posture, and what a credible program looks like at the mid-market asset level.
April 20, 2026
CIS Controls v8, the practical prioritization most MSPs skip
A working guide to the CIS Controls v8 Implementation Groups, why most MSPs ignore the prioritization and how a mid-market firm should actually sequence the 153 safeguards.
April 20, 2026
Law firm data protection, matter segregation and encryption practices
The practical data protection obligations a modern law firm carries, from client confidentiality and matter segregation to encryption, access controls and the new wave of enterprise-client security requirements.
April 20, 2026
Insurance agency IT, what your carrier expects from YOU
The cybersecurity and IT expectations insurance carriers, E&O underwriters and state regulators increasingly place on independent insurance agencies, and how an agency should actually comply.
April 20, 2026
IT for senior-care operators, HIPAA, multi-site and the state inspection
The practical IT and cybersecurity workload a multi-site senior-care operator carries, from HIPAA safeguards to the state inspection readiness the corporate office rarely thinks about.
April 19, 2026
HIPAA for business associates, what's in a BAA and what's not
What a Business Associate Agreement actually commits a vendor to, where the common misreadings surface and how a BA should build the program the BAA promises.
April 19, 2026
SOC 2 readiness vs. audit and why your MSP doesn't do audits
Why SOC 2 readiness and the SOC 2 audit are distinct engagements, why one firm cannot do both and how to sequence the two without burning budget or credibility.
April 19, 2026
Your first enterprise customer security questionnaire, what to expect
A practical walkthrough of the enterprise customer security questionnaire, what the buyer is actually measuring and how to respond without burning the deal.
April 19, 2026
SOC 2 Type I vs Type II: what your enterprise customer actually wants
A practical breakdown of SOC 2 Type I and Type II reports, what each one proves, and how to decide which to pursue for your first enterprise customer review.
April 19, 2026
NIST 800-171: the 110 controls and which ones eat the budget
A practical breakdown of the NIST 800-171 control families, which controls take the most effort for small and mid-market organizations and how to sequence the 90-120 day compliance arc.
April 19, 2026
NIST CSF 2.0 in plain English: what changed and why it matters
NIST CSF 2.0 added Govern as a sixth function and reorganized how small and mid-market organizations should think about cybersecurity. A practitioner's translation.