Image of someone putting in a letter

2 min read

Information to include in a breach notification

Healthcare organizations havetheresponsibilityof informing those impacted by data breaches. These notifications have to include information that enlightens patients as to the forms of data compromised. An American Medical Association article further...

Read More
Image of tree drawn with lines to look like data.

2 min read

What is a Merkle tree?

A section from the Encyclopedia of Database Systems states, “Merkle trees are data structures devised to authenticate, with a unique signature, a set...

Read More
Image of line graph

2 min read

U.S. health spending projections 2025-2032

Expert projections suggest some moderation in U.S. health spending in the coming years. Moreover, the effects of Medicare reforms, drug pricing...

Read More
Image of lock

2 min read

10 cybersecurity trends for 2025

Cyber threats are getting more advanced, and businesses must stay ahead. AI-powered attacks, ransomware, and insider threats are becoming harder to...

Read More
Image of laptop with lock.

2 min read

Implementing DMARC for healthcare email security

Domain-based Message Authentication, Reporting, and Conformance (DMARC) represents the final piece in modern email authentication. For healthcare...

Read More
progressive logo

1 min read

Progressive could settle class action suit for $3.25 million

What happened On August 1st, 2023, Progressive Casualty Insurance Company filed a data breach notice with the Attorney General of Maine.

Read More
united states with medical symbol

3 min read

US healthcare trends, challenges, and strategies for 2025

Healthcare organizations and insurers must prepare for a year of major changes driven by political shifts, regulatory changes, and digital...

Read More
apple log on red background

2 min read

Apple warns of ‘extremely sophisticated attack’ targeting iPhones and iPads

Apple has issued an urgent security update after discovering that some iPhones and iPads have been targeted by a highly sophisticated attack.

Read More
red security shield

1 min read

Hospital Sisters Health breach causes massive outage across 15 hospitals

The breach caused a massive outage, impacting 15 hospitals across Wisconsin and Illinois.

Read More
medical imaging

1 min read

Major security flaws identified in popular medical imaging software

Two significant vulnerabilities have been discovered in widely used medical imaging software, potentially exposing sensitive patient data.

Read More
digital concept of cyberattack

2 min read

Safeguarding against business email compromise (BEC) in healthcare

Business email compromise (BEC) remains one of the most costly cyber threats facing organizations, with the FBI's 2023 Internet Crime Report...

Read More
Image of phone being held up towards a cloud.

2 min read

Securing patient data in cloud email systems

As healthcare organizations increasingly migrate to cloud-based email solutions, protecting patient data becomes more complex. The centralization of...

Read More
Image of someone checking email on a tablet

2 min read

Securing healthcare email authentication with DKIM

Domain Keys Identified Mail (DKIM) provides a layer of email security for healthcare organizations by ensuring email authenticity and preventing...

Read More