Cybersecurity (10)

blood supply bags with barcode

2 min read

FDA urges blood suppliers to improve cyber defenses

The US Food and Drug Administration (FDA) recently called on blood suppliers to increase their cybersecurity to safeguard the safety and integrity of...

Read More
Image of locks for blog about Managing technological and physical risk

1 min read

Managing technological and physical risks

Technological risks are the vulnerabilities arising from digital infrastructure. Meanwhile, physical risks are threats that could lead to physical...

Read More
Image of data storage for blog about How to secure central storage devices

2 min read

How to secure central storage devices

Organizations must secure any vulnerabilities in central storage devices. Security requirements may depend on the device and the organization, as...

Read More
Image of calculator for blog about What is a cost-benefit analysis?

2 min read

What is a cost-benefit analysis?

Cost-benefit analyses (CBAs) are rooted in economic evaluation, assigning monetary values to both costs and benefits. It can be applied to risk...

Read More
Image of magnifying glass for blog about The uses of control analyses in email policy control

2 min read

The uses of control analyses in email

Control analysis is a way for healthcare organizations to test the technical safeguards required by the HIPAA Security Rule. The test itself extends...

Read More
Image of shield for blog about What are forensic protocols?

2 min read

What are forensic protocols?

Forensic protocols are procedures and guidelines used to provide an accurate analysis of evidence in legal and investigative scenarios. These...

Read More
Image of tiles falling over for blog about Does vulnerability management have a place in healthcare?

2 min read

Does vulnerability management have a place in healthcare?

Vulnerability management is the process of identifying, evaluating, treating, and reporting security vulnerabilities in systems and software, which...

Read More
Image of lock for blog about What is a threat intelligence platform?  

5 min read

What is a threat intelligence platform?

Cyber threat actors are constantly developing new tools and techniques to bypass existing defenses, putting organizations at risk of security...

Read More
Image of cloud for blog about How hackers are using AI to steal healthcare data

4 min read

How hackers are using AI to steal healthcare data

Research on Artificial Intelligence in Healthcare and Education defines AI as computer systems that can perform tasks that usually require human...

Read More
Image of computer hardware for blog about What is operational technology? 

2 min read

What is operational technology? 

Operational technology (OT) is the hardware and software systems that monitor, control and manage operations. OT systemswhen combined with...

Read More
bug on keyboard

3 min read

Understanding next-generation antivirus

According to Crowdstrike, “Next-Generation Antivirus (NGAV) uses a combination of artificial intelligence, behavioral detection, machine learning...

Read More
apple icon on laptop

3 min read

The latest scam: ‘Your Apple ID is suspended’

What happened A new phishing scam is targeting Apple users by sending fake emails claiming that the recipient's Apple ID, now referred to as "Apple...

Read More
Image of person in a hoody in a computer for blog about Hackers use SVG attachments for phishing and malware delivery

2 min read

Hackers use SVG attachments for phishing and malware delivery

Threat actors exploit SVG attachments to bypass security tools, delivering phishing forms and malware with alarming effectiveness.

Read More