The recent PBI Research Services data breach keeps growing. See our FAQ section for

Death Audit Pros

Death Audit ProsDeath Audit ProsDeath Audit Pros

Death Audit Pros

Death Audit ProsDeath Audit ProsDeath Audit Pros
  • Home
  • FAQ
  • News
  • About Me
  • Important Links
  • More
    • Home
    • FAQ
    • News
    • About Me
    • Important Links
  • Sign In
  • Create Account

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out


Signed in as:

filler@godaddy.com

  • Home
  • FAQ
  • News
  • About Me
  • Important Links

Account


  • My Account
  • Sign out


  • Sign In
  • My Account

Important Links

On this page, we list important links pertaining to death audit services and solutions and security. 

Links

Security Related Links

All security related links.

CVE

The CVE® Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. There is one CVE Record for each vulnerability in the catalog. The vulnerabilities are discovered then assigned and published by organizations from around the world that have partnered with the CVE Program. Partners publish CVE Records to communicate consistent descriptions of vulnerabilities. Information technology and cybersecurity professionals use CVE Records to ensure they are discussing 

OWASP

OWASP (Open Web Application Security Project) was founded in 2001 and is a community for developers that works to improve software security through led open source software projects.

OWASP organizes leading education and training programs in the field of cybersecurity so that thousands of members can ensure that security experts and developers remain aware of the ongoing security threats.

SSL Test

Qualys SSL Server Test.  This free online service performs a deep analysis of the configuration of any SSL web server on the public Internet. It will provide an overall grade and show you the grade for [Certificate, Protocol Support, Key Exchange & Ciper Strength]

NIST Cybersecurity Framework

NIST Cybersecurity Framework  (CSF) 2.0 Reference Tool 

This NIST Cybersecurity Framework (CSF) 2.0 Reference Tool allows users to explore the Draft CSF 2.0 Core (Functions, Categories, Subcategories, Implementation Examples). The Tool offers human and machine-readable versions of the draft Core (in JSON and Excel). It also allows users to view and export portions of the Core using key search terms. 

HIPAA Cyber Security Guidance

HIPAA Cyber Security Rule Guidance Material 

You will find educational materials to help you learn more about the HIPAA Security Rule and other sources of standards for safeguarding electronic protected health information (e-PHI). 


Limited Death Master File - Security Guidelines

Limited Death Master File - Security Guidelines

Information security guidelines for using and protecting the Limited Access DMF information. PB2016-103252.

2 Kings 12:15

  • Home
  • FAQ
  • News
  • About Me
  • Important Links

Death Audit Pros

Sparks, NV

775-444-2127

Copyright © 2023 Death Audit Pros - All Rights Reserved.

Powered by GoDaddy

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept