Image of hooded figure for blog about Healthcare ransomware attacks continue to increase in number and severity

3 min read

Report shows healthcare ransomware attacks are increasing

The healthcare sector has seen a rise in ransomware attacks, even as many other industries have experienced a decline. According to the State of Ransomware in Healthcare 2024 report by Sophos, 67% of healthcare organizations surveyed reported...

Read More
Image of a Nokia phone for blog about Nokia investigates breach after hacker claims to steal source code

2 min read

Nokia investigates breach after hacker claims to steal source code

Nokia, a leader in telecommunications, is investigating a cybersecurity breach after a hacker, known as IntelBroker, claimed to have accessed and is...

Read More
digital concept of gray security shield

3 min read

How do we protect patient data against insider threats?

Insider threats put the healthcare industry's security and confidentiality of patient data at risk. Healthcare organizations often overlook potential...

Read More
Image of lock for blog about Preventing cyberattacks after layoffs

3 min read

Preventing cyberattacks after layoffs

According to a study about the impacts of layoffs on cybersecurity breaches, companies may face an increased risk of cyberattacks after letting...

Read More
Image of surveillance camera for blog about HIPAA and video surveillance 

4 min read

HIPAA and video surveillance

Healthcare organizations have long used video surveillance to enhance security, monitor patient and staff activities, and reduce risks. However,...

Read More
docusign logo for post The threat of fake invoices: Understanding DocuSign Envelopes API abuse

2 min read

The threat of fake invoices: Understanding DocuSign Envelopes API abuse

Cybercriminals are now using DocuSign’s Envelopes API to send fake invoices that look legitimate, bypassing usual email security checks.

Read More
blue digital lock for post October OCR cybersecurity newsletter warns of social engineering attacks

2 min read

October OCR cybersecurity newsletter warns of social engineering attacks

The latest cybersecurity newsletter from the Office for Civil Rights (OCR) has a clear message for healthcare organizations: social engineering...

Read More
lawyer with office paperwork for post What is a HIPAA power of attorney?

4 min read

What is a HIPAA power of attorney?

Understanding healthcare decisions and ensuring patient privacy can be overwhelming, especially when someone isn’t able to make decisions on their...

Read More
digital lock on computer for post What is threat hunting?

4 min read

What is threat hunting?

According to IBM, “Threat hunting, also known as cyberthreat hunting, is a proactive approach to identifying previously unknown, or ongoing...

Read More
computer screen with multiple people on a video call for post Meeting HIPAA requirements while working remotely

3 min read

Meeting HIPAA requirements while working remotely

The Department of Health and Human Services (HHS) explains, “Telework has immediate and long-term benefits for healthcare organizations but security...

Read More
encryption key red for post New tool bypasses Google Chrome’s new cookie encryption system

2 min read

New tool bypasses Google Chrome’s new cookie encryption system

A new tool has been released that can bypass Google Chrome’s latest cookie encryption, sparking concerns over the security of user data stored in the...

Read More
Image of megaphone and phone for blog about HIPAA marketing rules private practices need to know

4 min read

HIPAA marketing rules private practices need to know

Private practices must understand HIPAA marketing requirements to successfully create campaigns that pull in patients while keeping their protected...

Read More
Image of servers with cloud in the middle for blog about HIPAA compliant servers

4 min read

HIPAA compliant servers

Healthcare organizations generate and store vast amounts of sensitive data however protecting that information isn’t just about following the...

Read More