NIST takes a stand against nonsensical password rules

2 min read

NIST takes a stand against nonsensical password rules

The National Institute of Standards and Technology (NIST) is pushing to eliminate outdated password rules in a sweeping overhaul to enhance security and user experience.

Read More
Common text messaging cyberattacks

7 min read

Common text messaging cyberattacks

Text messaging is a convenient and effective form of communication, but it also presents opportunities for cybercriminals to exploit unsuspecting...

Read More
Learning from U.S. sanctions against Russian ransomware laundering

3 min read

Learning from U.S. sanctions against Russian ransomware laundering

On the 26th of September, the U.S. Treasury made headlines by sanctioning two cryptocurrency exchanges, Cryptex and PM2BTC, for laundering millions...

Read More
Implementing RBAC

2 min read

Implementing RBAC

Implementing RBAC provides a structured, secure, and scalable way to manage user access across an organization. By defining roles, assigning...

Read More
Data leak exposes personal details of over 100 million Americans

1 min read

Data leak exposes personal details of over 100 million Americans

A data leak has exposed the personal and employment information of over 100 million Americans. The breach occurred due to a background check...

Read More
UMC health system forced to divert patients amidst ransomware attack

1 min read

UMC health system forced to divert patients amidst ransomware attack

A ransomware attack forced UMC to divert their patients to other facilities due to large scale IT outages affecting essential services.

Read More
What is TPA in healthcare

4 min read

What is TPA in healthcare

A third-party administrator (TPA) in healthcare is an independent individual or organization responsible for managing administrative tasks for an...

Read More
Delta Health System announces data breach

2 min read

Delta Health System announces data breach

The Missouri-based healthcare system recently provided a notice that the organization faced a data breach.

Read More
Identifying PHI

4 min read

Identifying PHI

Protected health information (PHI) refers to any information about health status, healthcare provision, or payment for healthcare that can be linked...

Read More
CISA unveils cybersecurity plan to protect federal agencies

2 min read

CISA unveils cybersecurity plan to protect federal agencies

The CISA has released a federal plan to improve cybersecurity coordination and defense across over 100 federal agencies.

Read More
HHS OIG report flags Medicare remote patient monitoring systems

1 min read

HHS OIG report flags Medicare remote patient monitoring systems

On September 24, 2024, the HHS OIG released a report illustrating the need for improved oversight of remote patient monitoring in Medicare.

Read More
Supporting men's mental health with technology

2 min read

Supporting men's mental health with technology

Mental health challenges affect both men and women, but there isn’t nearly as much conversation about men’s mental health. While we’ve made some...

Read More
How to retain therapy clients

2 min read

How to retain therapy clients

Therapists must retain their clients to continue care and develop a meaningful therapeutic relationship.

Read More