Cybersecurity

Image of cogs in a machine.

6 min read

Machine learning-based intrusion detection systems

The healthcare industry is facing an unprecedented surge in cyber threats, with sensitive patient data becoming an increasingly valuable target for...

Read More
Image of someone handing cash to someone else.

5 min read

What is diversion theft?

Diversion theft is a social engineering tactic that tricks individuals or businesses into redirecting valuable goods or information to an unintended...

Read More
Image of dental tools.

4 min read

How to respond to a data breach in a dental prcatice

In dental practices, a data breach typically involves the compromise of patient information, such as personal details, medical records, or financial...

Read More
Image of file folders in a cabinet.

2 min read

What are data classifications?

While HIPAA does not require specific data classification levels, organizations often adopt a simple three level classification system. These can...

Read More
digital floating health icons

2 min read

Microsoft: Navigating the healthcare cyber threat landscape

During SANS CTI Summit Solutions Track 2025, Microsoft’s Director of Threat Intelligence Strategy, Sherrod DeGrippo, discussed the growing ransomware...

Read More
Image of shield with keyhole.

2 min read

Applying continuous threat management to email communication audits

Continuous threat management, or continuous threat exposure management (CTEM), is a cybersecurity strategy designed to mitigate threats across an...

Read More
Image of Internet search bar.

2 min read

What is real-time URL scanning?

Email security threats continue to evolve, with malicious URLs becoming increasingly sophisticated. According to research from Beijing Electronic...

Read More
Image of several people on computers in a meeting.

2 min read

Building healthcare security awareness programs

Healthcare organizations face unique cybersecurity challenges, from protecting patient data to maintaining HIPAA compliance. While technical controls...

Read More
Image of phone with a cloud over it.

2 min read

Securing healthcare data with Cloud Access Security Brokers (CASB)

Healthcare organizations are adopting cloud services for everything from electronic health records (EHR) to telehealth platforms. This migration...

Read More
Image of medical files in folders.

3 min read

Misuse of medical records

The misuse of medical records can take several forms, including unauthorized access, data breaches, fraud, and improper disclosure of patient...

Read More
Image of a chain link to signify blockchain nodes.

3 min read

What are nodes in blockchain?

According to a study published in Forbes, “The name blockchain is hardly accidental: The digital ledger is often described as a “chain” that’s made...

Read More
red digital lock

2 min read

CL0P Ransomware resurfaces, targeting telecom and healthcare sectors

The notorious CL0P ransomware group launched a new wave of attacks in early 2025, exploiting zero-day vulnerabilities to target telecommunications...

Read More
Image of someone using a computer mouse.

3 min read

What is clickjacking?

According to Forbes, “A clickjacking hack attack,simply explained, is one that employs various methods to get users clicking on invisible or...

Read More