digital concept of gray security shield

3 min read

How do we protect patient data against insider threats?

Insider threats put the healthcare industry's security and confidentiality of patient data at risk. Healthcare organizations often overlook potential dangers within their walls. To better protect patient information, organizations should understand...

Read More
Image of lock for blog about Preventing cyberattacks after layoffs

3 min read

Preventing cyberattacks after layoffs

According to a study about the impacts of layoffs on cybersecurity breaches, companies may face an increased risk of cyberattacks after letting...

Read More
Image of surveillance camera for blog about HIPAA and video surveillance 

4 min read

HIPAA and video surveillance

Healthcare organizations have long used video surveillance to enhance security, monitor patient and staff activities, and reduce risks. However,...

Read More
docusign logo for post The threat of fake invoices: Understanding DocuSign Envelopes API abuse

2 min read

The threat of fake invoices: Understanding DocuSign Envelopes API abuse

Cybercriminals are now using DocuSign’s Envelopes API to send fake invoices that look legitimate, bypassing usual email security checks.

Read More
blue digital lock for post October OCR cybersecurity newsletter warns of social engineering attacks

2 min read

October OCR cybersecurity newsletter warns of social engineering attacks

The latest cybersecurity newsletter from the Office for Civil Rights (OCR) has a clear message for healthcare organizations: social engineering...

Read More
lawyer with office paperwork for post What is a HIPAA power of attorney?

4 min read

What is a HIPAA power of attorney?

Understanding healthcare decisions and ensuring patient privacy can be overwhelming, especially when someone isn’t able to make decisions on their...

Read More
digital lock on computer for post What is threat hunting?

4 min read

What is threat hunting?

According to IBM, “Threat hunting, also known as cyberthreat hunting, is a proactive approach to identifying previously unknown, or ongoing...

Read More
computer screen with multiple people on a video call for post Meeting HIPAA requirements while working remotely

3 min read

Meeting HIPAA requirements while working remotely

The Department of Health and Human Services (HHS) explains, “Telework has immediate and long-term benefits for healthcare organizations but security...

Read More
encryption key red for post New tool bypasses Google Chrome’s new cookie encryption system

2 min read

New tool bypasses Google Chrome’s new cookie encryption system

A new tool has been released that can bypass Google Chrome’s latest cookie encryption, sparking concerns over the security of user data stored in the...

Read More
Image of servers with cloud in the middle for blog about HIPAA compliant servers

4 min read

HIPAA compliant servers

Healthcare organizations generate and store vast amounts of sensitive data however protecting that information isn’t just about following the...

Read More
Image of a shield for blog about What is a HIPAA compliance plan?

4 min read

What is a HIPAA compliance plan?

A HIPAA compliance plan is a detailed, tailored strategy that enables healthcare organizations to respond swiftly and effectively to incidents,...

Read More
Image of lines that symbolize a network for blog about Benefits of digitalization in healthcare

5 min read

Benefits of digitalization in healthcare

The digitalization of healthcare has transformed how health services are how the healthcare system operates. Many practices rely on digitalized...

Read More
blue digital lock for post Healthcare data protection strategies

3 min read

Healthcare data protection strategies

Healthcare organizations face the challenge of protecting sensitive patient information. From personal identities to medical histories, this data is...

Read More