
HIPAA Security
HIPAA Security is vital in healthcare. Eagle writes about breaches and ways to protect yourself.
Eagle works with clients in healthcare and healthcare business associates to ensure HIPAA Security compliance. We provide a set of policy templates for a variety of business associate types including Cloud Vendors, Third Party Administrators, and Information Technology companies.


Recovering from a 3rd Generation Ransomware Attack
Recovering from Third-Generation Ransomware Attack Decision-makers need to understand the impacts of a third-generation ransomware attack so that they can properly allocate budgets and set priorities for recovering from ransomware, including: Safeguards that can... Read More
3rd Generation Ransomware – Worst Cyber Threat Yet for DD Boards
3rd Generation Ransomware – Worst Cyber Threat Yet Eagle Consulting Partners has been writing about the threats of ransomware for several years. We estimate that at least 25% of our customer base has had at least 1 ransomware incident during this time. Because of... Read MoreSecure Remote Access: Third-Party Risks
Some of the most infamous hacking incidents have arisen from third-party access to a corporate network that does not have secure remote access. Perhaps most infamously, the 2013 Target hack which compromised 110 million credit/debit cards used remote access granted... Read More