Cybersecurity

Image of someone typing.

4 min read

How legacy devices create backdoors into healthcare systems

Legacy devices create systematic backdoors through four primary vulnerabilities namely unpatched software, network exposure, default configurations,...

Read More
lock on keyboard with red screen reading ransomware

1 min read

Columbia Eye Clinic begins investigating likely ransomware attack

The South Carolina-based eye care center recently published a notice informing customers of a possible breach.

Read More
Image of someone using an authentication app.

4 min read

What are MFA bypass kits?

MFA bypass kits are tools or techniques designed to bypass Multi-Factor Authentication security measures. These kits exploit vulnerabilities in...

Read More
Image of a hand stopping falling blocks.

5 min read

The building blocks of risk management in healthcare facilities

The building blocks of risk management in healthcare facilities form a structured, cyclical process centered on proactive mitigation and...

Read More
Image of a man with a hoody on a laptop.

5 min read

What is an enumeration attack?

An enumeration attack is a method used by hackers to confirm and verify records stored on a web server using brute-force techniques. These attacks...

Read More
Image of cogs in a machine.

6 min read

Machine learning-based intrusion detection systems

The healthcare industry is facing an unprecedented surge in cyber threats, with sensitive patient data becoming an increasingly valuable target for...

Read More
Image of someone handing cash to someone else.

5 min read

What is diversion theft?

Diversion theft is a social engineering tactic that tricks individuals or businesses into redirecting valuable goods or information to an unintended...

Read More
Image of dental tools.

4 min read

How to respond to a data breach in a dental prcatice

In dental practices, a data breach typically involves the compromise of patient information, such as personal details, medical records, or financial...

Read More
Image of file folders in a cabinet.

2 min read

What are data classifications?

While HIPAA does not require specific data classification levels, organizations often adopt a simple three level classification system. These can...

Read More
digital floating health icons

2 min read

Microsoft: Navigating the healthcare cyber threat landscape

During SANS CTI Summit Solutions Track 2025, Microsoft’s Director of Threat Intelligence Strategy, Sherrod DeGrippo, discussed the growing ransomware...

Read More
Image of shield with keyhole.

2 min read

Applying continuous threat management to email communication audits

Continuous threat management, or continuous threat exposure management (CTEM), is a cybersecurity strategy designed to mitigate threats across an...

Read More
Image of Internet search bar.

2 min read

What is real-time URL scanning?

Email security threats continue to evolve, with malicious URLs becoming increasingly sophisticated. According to research from Beijing Electronic...

Read More
Image of several people on computers in a meeting.

2 min read

Building healthcare security awareness programs

Healthcare organizations face unique cybersecurity challenges, from protecting patient data to maintaining HIPAA compliance. While technical controls...

Read More