2FA
2FA enhances security by combining something the user knows (e.g., a password) with something the user has (e.g., a phone or security token).
Access control ensures only authorized users can access specific systems, resources, or data.
Accountability is the obligation of individuals or organizations to accept responsibility for their actions and decisions. Accountability is fundamental in the GRC for ensuring transparency and trust.
Accreditation is a formal recognition that an organization meets certain standards, often granted by an external body.
Advanced Persistent Threat (APT) is a sophisticated cyberattack where an unauthorized user gains access to a system and remains undetected for a prolonged period.
Adverse action is a decision that negatively impacts an individual or entity, such as denying credit or employment. It often triggers specific compliance requirements, such as providing reasons under the Fair Credit Reporting Act (FCRA).
Anti-Money Laundering (AML) regulations and procedures aimed at preventing criminals from disguising illegally obtained funds as legitimate income.
Application security is the practice of protecting software applications from security threats throughout the development lifecycle.
Application whitelisting is a security control that allows only approved or trusted applications to execute on a system.
Assessment is the process of evaluating risks, controls, or compliance to determine effectiveness. Assessments can be qualitative or quantitative and are essential for identifying areas of improvement.
Asset management is the process of tracking and managing an organization’s IT and information resources.
Asset tagging helps in monitoring the life cycle of IT resources and ensuring security controls are enforced.
An audit trail is a record of all user activities and transactions within a system.
Backup and recovery is the process of creating and storing copies of data that can be restored in case of data loss.
Behavior-Based Detection is a security approach that identifies potential threats based on deviations from normal behavior rather than relying solely on known attack patterns.
Benchmarking is the practice of comparing an organization's processes or performance metrics to industry standards or competitors. It helps identify compliance gaps and opportunities for improvement.
A network of compromised devices (bots) controlled remotely by attackers to perform malicious activities, such as launching DDoS attacks or sending spam. Botnets pose a significant threat to organizations by allowing attackers to harness distributed computing power for large-scale attacks.
Any PHI usage or disclosure that isn’t permitted under the Privacy Rule is considered a breach. When a breach occurs, Covered Entities are required to notify affected individuals.
A Business Associate is an entity that provides services to, or performs certain functions involving the use or disclosure of PHI on behalf of, a Covered Entity.
A BCP outlines procedures and processes to ensure that critical business functions can continue during and after a disaster. A well-prepared BCP minimizes downtime and protects the organization’s reputation during crises.
Cloud security involves the policies, controls, and technologies that protect cloud-based systems, data, and infrastructure.
A code of conduct is a set of rules outlining the social norms, ethical principles, and responsibilities of individuals within an organization.
Compliance Framework is a structured set of guidelines and practices that help organizations meet legal, regulatory, and operational requirements.
A compliance program is a company's set of internal artifacts (controls, policies, systems, etc.) put into place in order to comply with laws, rules, and regulations or to uphold the business's reputation.
A set of requirements defined by a law, or by an authority, that is widely accepted as a standard for demonstrating your trust to your customers.
Confidentiality ensures that sensitive information is accessible only to those authorized to view it. It is a key principle of information security, protecting data from unauthorized disclosure. Encryption, access control, and data masking are common methods used to maintain confidentiality.
Continuity is the planning and preparation to ensure that an organization can continue its critical operations in the event of a disruption. Business continuity planning is vital for resilience and risk management.
A control framework is a structured approach to managing risks by implementing controls across an organization.
Corporate Social Responsibility (CSR) is a company’s commitment to ethical behavior, environmental sustainability, and community well-being beyond legal requirements.
If you are a Covered Entity, you are subject to, and legally required to, comply with all the standards set forth by HIPAA.
Cyber Hygiene are the routine practices and behaviors that help maintain the security of information systems.
Cyber insurance helps mitigate the financial impact of security events, but organizations must still maintain robust security controls.
Cybersecurity refers to the practice of protecting systems, networks, and data from cyberattacks.
Cybersecurity compliance is about adherence to laws, policies, and standards that protect systems, networks, and data from cyber threats.
A data breach occurs when unauthorized individuals access or steal sensitive data. Breaches can result from hacking, insider threats, or weak security controls.
Data classification is the process of categorizing data based on its sensitivity and value to the organization.
Data encryption is the process of converting plaintext data into a coded form to prevent unauthorized access.
Data exfiltration is the unauthorized transfer of data from a network or system.
Data governance is about policies and practices ensuring data is managed securely, accurately, and responsibly throughout its lifecycle.
Data integrity ensures that data remains accurate, consistent, and unaltered during storage, processing, or transmission.
Data Leakage Prevention (DLP) is a strategy or tool designed to prevent unauthorized transmission of sensitive information outside the corporate network.