You have requested access to member-only content.
Perform vulnerability assessment before conducting penetration testing
While organizations should focus on performing regular risk assessments and analyses, there are also other ways in which they must review their systems for compliance. Often, these other evaluations are overlooked despite their value, says Kevin Beaver, CISSP, an information security consultant in Atlanta. In particular, organizations should be careful not to forget about performing vulnerability assessments and penetration tests, which are components of an overall risk assessment or analysis, says Beaver, who is a BOH editorial advisory board member.
This is an excerpt from member-only content. Please log in or become a member.
Log in to access this content:
Unable to log in?
Click here to reset your password or unlock your account.
Forgot your username?
Contact customer care at customerservice@hcpro.com or call 800-650-6787, between 8 AM - 5 PM CT
Not a member? Join now!
Revenue Cycle Advisor is the key to your organization's Medicare regulatory news and education. It combines all of HCPro's Medicare regulatory and reimbursement resources into one handy and easy-to-access portal. News is not just repeated from other sources. It is analyzed by our Medicare experts so professionals can comprehend any new rule updates thoroughly.
For questions and support, please call customer service: 800-650-6787.
Try before you buy with our FREE samples!