3 min read
How to prevent quishing attacks
Quishing attacks use QR codes to trick users into visiting malicious websites. As QR codes become more widespread, the potential for quishing attacks...
3 min read
Quishing attacks use QR codes to trick users into visiting malicious websites. As QR codes become more widespread, the potential for quishing attacks...
3 min read
Two-way SSL/TLS (Secure Sockets Layer/Transport Layer Security), also known as mutual authentication, is a security protocol that ensures the client...
2 min read
In recent months, four HIPAA-covered entities—Southern Bone & Joint Specialists, Connally Memorial Medical Center, Rim Country Health and...
3 min read
The healthcare industry is increasingly leveraging digital tools to improve patient access, offer services like appointment scheduling, and even...
2 min read
Data rights management (DRM) refers to the technologies and processes used to control how digital data is accessed, shared, and used. These processes...
5 min read
The Healthcare Information and Management Systems Society (HIMSS) conducted its annual healthcare cybersecurity survey, showing the current state of...
1 min read
Contingency operations refer to military and governmental activities to prepare for, respond to, or recover from unforeseen events or emergencies....
1 min read
Ephemeral messaging refers to sending digital messages that automatically disappear after a certain period.
1 min read
Nonrepudiation controls are security measures that ensure individuals cannot deny responsibility for their actions or communications in a system. In...
2 min read
A distributed denial-of-service (DDoS) attack impacts HIPAA compliance by disrupting the availability of protected health information (PHI), a...
3 min read
According to Crowdstrike, “Pass-the-hash (PtH) is a type of cybersecurity attack in which an adversary steals a “hashed” user credential and uses it...
3 min read
Hospitals must prevent HIPAA violations using an advanced cybersecurity framework, staff training, and behavioral policies.
3 min read
Contextual multi-factor authentication (MFA), also known as adaptive authentication, is an advanced security approach that adjusts authentication...