Cybersecurity

Deepfake technology in social engineering attacks

2 min read

Deepfake technology in social engineering attacks

The term deepfake stems from combining “deep learning,” a subset of machine learning, and “fake,” reflecting the technology's ability to produce...

Read More
What are predictive analytics exploits?

1 min read

What are predictive analytics exploits?

Predictive analytics exploits are techniques that analyze historical data to forecast future events, helping organizations make informed decisions...

Read More
Incident reports in the compliance reporting process

4 min read

Incident reports in the compliance reporting process

Healthcare settings are inherently prone to accidents and incidents that can impact patients and organizations. Maintaining an incident reporting...

Read More
When are shadow records a risk to healthcare cybersecurity?

1 min read

When are shadow records a risk to healthcare cybersecurity?

Shadow records are patient records in systems separate from themain patient record systems in healthcare organizations. These systems are often...

Read More
Who should notify patients when a data breach happens?

2 min read

Who should notify patients when a data breach happens?

A covered entity should notify patients directly when a data breach involves their PHI.

Read More
2024 OCR cybersecurity newsletter

3 min read

2024 OCR cybersecurity newsletter

As cyberattacks and data breaches increase, improving physical security in healthcare facilities is necessary. HIPAA-covered entities and business...

Read More
Understanding DNS configurations for email security

4 min read

Understanding DNS configurations for email security

Email is a common communication tool, but it also attracts malicious actors. To strengthen your email security, focus on Domain Name System (DNS)...

Read More
What is rate limiting?

1 min read

What is rate limiting?

Rate limiting controls the number of requests made from an API to promote fair access, and maintain peak performance.

Read More
What are blind signatures?

1 min read

What are blind signatures?

A blind signature is a cryptographic method that hides the content of a message while it is being signed. It’s often used when the sender wants to...

Read More
CISA unveils new reporting portal for threat response 

2 min read

CISA unveils new reporting portal for threat response

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has rolled out a new portal to improve how cyber incidents and data breaches are...

Read More
CrowdStrike's congressional testimony: Addressing cybersecurity vulnerabilities

2 min read

CrowdStrike's congressional testimony: Addressing cybersecurity vulnerabilities

A faulty software update from cybersecurity firm CrowdStrike is under scrutiny as the company prepares to testify before Congress. Lawmakers try to...

Read More
What is WAN optimization?

1 min read

What is WAN optimization?

WAN optimization improves data transfer processes by using various techniques including compression.

Read More
PHI sharing in multi-agency services collaboration

2 min read

PHI sharing in multi-agency services collaboration

Multi-agency services in healthcare bring together different health and social service experts to provide comprehensive care to patients. By working...

Read More