Image of shield for blog about What are forensic protocols?

2 min read

What are forensic protocols?

Forensic protocols are procedures and guidelines used to provide an accurate analysis of evidence in legal and investigative scenarios. These protocols are often applied after a breach occurs, allowing for an analysis of what caused a breach and how...

Read More
blue yonder logo

1 min read

Blue Yonder data breach exposes supply chain vulnerabilities

Blue Yonder experienced a data breach, compromising its operations and potentially clients relying on the supply chain management solution.

Read More
Image of stick figures excluding another figure for blog about Addressing implicit biases in email communication

2 min read

Addressing implicit biases in email communication

Implicit biases are the unconscious attitudes and stereotypes that influence how people make decisions. These biases can exist in healthcare...

Read More
Image of tiles falling over for blog about Does vulnerability management have a place in healthcare?

2 min read

Does vulnerability management have a place in healthcare?

Vulnerability management is the process of identifying, evaluating, treating, and reporting security vulnerabilities in systems and software, which...

Read More
Image of religious symbols for blog about How belief systems and religion should factor into written communications 

2 min read

How belief systems and religion should factor into communication

Religious beliefs often influence the way people view health and acceptable treatments. While communication between patient and provider should...

Read More
Image of files transferring between individuals or computers for blog about The role of clearinghouses in PHI exchanges

2 min read

The role of clearinghouses in PHI exchanges

Clearinghouses assist protected health information (PHI) exchanges by acting as intermediaries between healthcare providers and insurance companies....

Read More
Image of computer hardware for blog about What is operational technology? 

2 min read

What is operational technology? 

Operational technology (OT) is the hardware and software systems that monitor, control and manage operations. OT systemswhen combined with...

Read More
computer code on screen

1 min read

Michigan medical practice exposes patient data in email breach

East Paris Internal Medicine Associates, PC, recently experienced a data breach affecting thousands of individuals through an email-related attack.

Read More
law gavel

1 min read

Online pharmacy hit with $7.5M settlement after massive data breach

Post Meds recently settled a class action lawsuit for $7.3 million following a 2023 data breach exposing the information of millions of affected...

Read More
Image of hacker for blog about Atlantic Orthopaedic Specialists hit by email breach

1 min read

Atlantic Orthopaedic Specialists hit by email breach

On August 6, 2024, Atlantic Orthopaedic Specialists, also known as Vann Virginia Center for Orthopaedics, discovered unauthorized access to one of...

Read More
Image of someone hacking into a computer for blog about What is a Smurf attack?

2 min read

What is a Smurf attack?

A smurf attack is a type of distributed denial of service (DDos) attack where the attacker uses a network's broadcast addresses to flood a target...

Read More
digital globe with floating lock icons

2 min read

What are nation states?

Nation states are groups or organizations affiliated with a government that direct cyber operations in a way that advances their national interest....

Read More
library of congress

1 min read

Library of Congress email systems breached in a cyberattack

The Library of Congress was hacked earlier in 2024 by adversaries. The attack was targeted against the organization's email accounts.

Read More