What You Need to Know about Access Control

A major component of IT security is determining who is allowed into your structure, both physically and logically, and what they do once they have gained access. Access control determines who has how much access. To get control, organizations must lock down their systems, including hosts, networks, applications, data stores, and data flows.

Read more

Earn Compound Interest on Every Call

Everyone knows someone. Actually, everyone knows several someones. Your customers – as well as the prospects you call on – have some contact with, or at the very least know of, people who can benefit from your product or service. Unfortunately, they are not programmed to automatically disclose the names of those people to you.[…] Read More

The post Earn Compound Interest on Every Call appeared first on Sales Training Blog | Sandler Training.

Read more

The New HIPAA/HITECH Rules: Compliance vs. Cybersecurity

Those in the healthcare industry should be very familiar with the new security and privacy rules under the Health Information Technology for Economic and Clinical Health Act (HITECH), enacted to strengthen the health information privacy and security protections established under the Health Insurance Portability and Accountability Act of 1996 (HIPAA), as the deadline for compliance was September 23, 2013. The big news though is that many vendors who provide services to “covered entities” may now fall under the definition of a “business associate” (BA) and be held liable if not in compliance. If you’re not sure, read the new rule and definition now or get some help to be sure you haven’t missed a deadline.

Read more