3 min read
Preventing cyberattacks after layoffs
According to a study about the impacts of layoffs on cybersecurity breaches, companies may face an increased risk of cyberattacks after letting...
3 min read
According to a study about the impacts of layoffs on cybersecurity breaches, companies may face an increased risk of cyberattacks after letting...
2 min read
A single breach can lead to significant financial losses, damage to reputation, and legal liabilities. Fortunately, proactive planning and robust...
2 min read
Cybercriminals are now using DocuSign’s Envelopes API to send fake invoices that look legitimate, bypassing usual email security checks.
2 min read
The latest cybersecurity newsletter from the Office for Civil Rights (OCR) has a clear message for healthcare organizations: social engineering...
4 min read
According to IBM, “Threat hunting, also known as cyberthreat hunting, is a proactive approach to identifying previously unknown, or ongoing...
3 min read
With a second term on the horizon, Trump’s cybersecurity policies could shape the future of US defenses against ransomware, business email...
1 min read
While HIPAA does not explicitly mention micro-segmentation, it is a security approach aligning with HIPAA’s security requirements by limiting access...
3 min read
Healthcare organizations face the challenge of protecting sensitive patient information. From personal identities to medical histories, this data is...
2 min read
405(d) is a program targeted at tackling the prevalent cybersecurity threat healthcare organizations face nationwide. The program aims to provide...
2 min read
The HHS/NIST conference, titled Safeguarding Health Information: Building Assurance through HIPAA Security 2024, took place on October 24, 2024, in...
3 min read
With 328.77 million terabytes of data created daily, it's no surprise that cyber threats are on the rise, as criminals look to exploit this valuable...
2 min read
Quishing is a cyber threat that exploits QR codes and phishing in deceptive emails, posing risks like data breaches and malware infections. The HC3...
2 min read
Cybersecurity performance goals (CPGs) are a set of cybersecurity best practices and minimum-security standards developed by the Cybersecurity and...