Image of lock on keyboard for aticle about what is a pass-the-hash attack?

3 min read

What is a pass-the-hash attack?

According to Crowdstrike, “Pass-the-hash (PtH) is a type of cybersecurity attack in which an adversary steals a “hashed” user credential and uses it to create a new user session on the same network.” In these attacks, hackers use older passwords to...

Read More
law gavel in front of books with a stethescope

3 min read

Can a patient sue for a HIPAA violation?

HIPAA does not allow patients to sue for violations. However, under state laws, healthcare providers can be sued. Patients can file complaints with...

Read More
chart on paper with magnifying glass for post Understanding HIPAA healthcare statistics

3 min read

Understanding HIPAA healthcare statistics

The HIPAA Privacy Rule mandates security standards for HIPAA-covered entities to protect patient information and promote cybersecurity policies....

Read More
Image of someone touching a digital screen for blog post on Regulating AI in healthcare

4 min read

Regulating AI in healthcare

Artificial intelligence (AI) has quickly transformed many industries, and healthcare is no exception. Along with the benefits, there are growing...

Read More
Can HIPAA violations lead to termination?

3 min read

Can HIPAA violations lead to termination?

HIPAA violations can have serious consequences for both healthcare organizations and individual employees. The severity of a violation, along with...

Read More
How HIPAA gives patients control over health information

2 min read

How HIPAA gives patients control over health information

HIPAA gives patients greater control over health information through several provisions. These include the rights to access, consent, privacy,...

Read More
NIST takes a stand against nonsensical password rules

2 min read

NIST takes a stand against nonsensical password rules

The National Institute of Standards and Technology (NIST) is pushing to eliminate outdated password rules in a sweeping overhaul to enhance security...

Read More
Data leak exposes personal details of over 100 million Americans

1 min read

Data leak exposes personal details of over 100 million Americans

A data leak has exposed the personal and employment information of over 100 million Americans. The breach occurred due to a background check...

Read More
What is TPA in healthcare

4 min read

What is TPA in healthcare

A third-party administrator (TPA) in healthcare is an independent individual or organization responsible for managing administrative tasks for an...

Read More
What is Kerberoasting?

2 min read

What is Kerberoasting?

According to IBM, “Kerberoasting is a cyberattack that exploits the Kerberos authentication protocol. Threat actors steal Kerberos service tickets to...

Read More
Understanding HIPAA

5 min read

Understanding HIPAA

The Health Insurance Portability and Accountability Act (HIPAA) is a piece of legislation that influences how organizations manage sensitive patient...

Read More
Cybersecurity trends and threats in healthcare

3 min read

Cybersecurity trends and threats in healthcare

The Health-ISAC’s Healthcare Heartbeat report discusses ransomware and cybercrime trends that could affect healthcare organizations. The resource...

Read More
FBI issues warning on surging BEC scams causing $55 billion in losses

2 min read

FBI issues warning on surging BEC scams causing $55 billion in losses

The Federal Bureau of Investigation (FBI) has warned businesses, urging them to bolster their defenses against business email compromise (BEC)...

Read More