Cybersecurity (10)

Image of QR code for blog about How to prevent quishing attacks

3 min read

How to prevent quishing attacks

Quishing attacks use QR codes to trick users into visiting malicious websites. As QR codes become more widespread, the potential for quishing attacks...

Read More
Image showing computer servers communicating for blog about Defining two-way SSL/TLS

3 min read

Defining two-way SSL/TLS

Two-way SSL/TLS (Secure Sockets Layer/Transport Layer Security), also known as mutual authentication, is a security protocol that ensures the client...

Read More
Image of shield for blog about Learning from recent email breaches

2 min read

Learning from recent email breaches

In recent months, four HIPAA-covered entities—Southern Bone & Joint Specialists, Connally Memorial Medical Center, Rim Country Health and...

Read More
Image of pixels in an earth-shape for blog about The hidden risks of third-party data sharing on healthcare websites

3 min read

The hidden risks of third-party data sharing on healthcare websites

The healthcare industry is increasingly leveraging digital tools to improve patient access, offer services like appointment scheduling, and even...

Read More
Image of globe with different digital graphics, like graphs, for blog about What is data rights management?

2 min read

What is data rights management?

Data rights management (DRM) refers to the technologies and processes used to control how digital data is accessed, shared, and used. These processes...

Read More
HIMSS logo for post HIMSS healthcare cybersecurity survey

5 min read

HIMSS healthcare cybersecurity survey

The Healthcare Information and Management Systems Society (HIMSS) conducted its annual healthcare cybersecurity survey, showing the current state of...

Read More
Image of padlock for article about understanding contingency operations for email

1 min read

Understanding contingency operations for email

Contingency operations refer to military and governmental activities to prepare for, respond to, or recover from unforeseen events or emergencies....

Read More
Image of email icon for blog about Understanding ephemeral messaging

1 min read

Understanding ephemeral messaging

Ephemeral messaging refers to sending digital messages that automatically disappear after a certain period.

Read More
Image of a stack of paper for blog on What are nonrepudiation controls?

1 min read

What are nonrepudiation controls?

Nonrepudiation controls are security measures that ensure individuals cannot deny responsibility for their actions or communications in a system. In...

Read More
Image of someone's back facing the viewer for a blog about DDos attacks and their impact on HIPAA compliance

2 min read

DDos attacks and their impact on HIPAA compliance

A distributed denial-of-service (DDoS) attack impacts HIPAA compliance by disrupting the availability of protected health information (PHI), a...

Read More
Image of lock on keyboard for aticle about what is a pass-the-hash attack?

3 min read

What is a pass-the-hash attack?

According to Crowdstrike, “Pass-the-hash (PtH) is a type of cybersecurity attack in which an adversary steals a “hashed” user credential and uses it...

Read More
shelves of paper medical records for post Why certain hospitals have a higher risk of violating HIPAA

3 min read

Why certain hospitals have a higher risk of violating HIPAA

Hospitals must prevent HIPAA violations using an advanced cybersecurity framework, staff training, and behavioral policies.

Read More
Image of phone and laptop for blog about Understanding contextual multi-factor authentication (MFA)

3 min read

Understanding contextual multi-factor authentication (MFA)

Contextual multi-factor authentication (MFA), also known as adaptive authentication, is an advanced security approach that adjusts authentication...

Read More