Cybersecurity

digital profile icon

2 min read

Healthcare leaders assess bill’s impact on privacy, digital IDs

On November 6, 2025, the Citizens’ Council for Health Freedom (CCHF) announced a coalition effort against the federal REAL ID Act of 2005.

Read More
Image of someone with Microsoft Teams open on their phone.

2 min read

Microsoft Teams adds false-positive reporting feature

Microsoft Teams is rolling out a new feature allowing users to report messages incorrectly flagged as security threats, with worldwide availability...

Read More
Image of a blue lock.

2 min read

Tycoon 2FA phishing kit bypasses MFA protections on Microsoft 365 and Gmail

A phishing kit called Tycoon 2FA is enabling attackers to bypass multi-factor authentication and steal login credentials from enterprise email users.

Read More
Image of someone logging into an email account.

2 min read

Phishing campaign uses UUIDs and fake login pages to bypass email security

A new phishing campaign is using deceptive scripting and .org domains to evade detection and steal user credentials.

Read More
hands on laptop with email icons

4 min read

The hidden costs of legacy email systems in healthcare

In healthcare, email remains the primary means of communication, connecting clinicians, administrative staff, patients, and external vendors. As the...

Read More
claude logo

2 min read

Hackers exploit Claude AI to steal user data via prompt injection backdoor

A newly discovered exploit in Claude shows how hackers can manipulate artificial intelligence systems to steal sensitive user data. Security...

Read More
blue digital security shield

5 min read

Long-term planning to help prevent cyberattacks

To provide safe, effective, and efficient patient care, healthcare organizations are becoming reliant on digital infrastructure and connected medical...

Read More
medical symbol with tools

4 min read

Tension between uniformity and flexibility in health-sector cybersecurity

“On one hand, the HISAA would provide for consistent standards and a more proactive approach to address cybersecurity and breach risk (i.e., set the...

Read More
Image of a shield.

2 min read

What is security resilience?

Security resilience refers to an organization’s ability to prepare for, withstand, adapt to, and recover quickly from cyberattacks, system failures,...

Read More
Image of a downtown area in North Korea.

2 min read

US sanctions North Korean IT network aiding weapons program

New sanctions target individuals and companies facilitating illicit IT worker schemes linked to North Korea.

Read More
floating digital icons

2 min read

Google fined €325M for inserting ads in Gmail, misusing cookies in France

The CNIL has penalized Google for advertising practices in Gmail and cookie consent violations impacting over 74 million users in France.

Read More
Image of someone on a desktop computer.

4 min read

How can an MSP protect ePHI?

Healthcare organizations are under constant pressure to balance patient care with stringent data protection requirements. One of the most critical...

Read More
stethoscope on keyboard

4 min read

Securing telehealth and remote healthcare with SASE

Remote healthcare has moved from a pandemic-driven necessity to a permanent part of modern medical delivery. As noted in a 2023 OECD publication, The...

Read More