1 min read
What is destructive malware?
Threat actors often choose to exploit the most commonly accessed and least protected points of entry into the networks of the organizations they...
1 min read
Threat actors often choose to exploit the most commonly accessed and least protected points of entry into the networks of the organizations they...
2 min read
The Office for Civil Rights (OCR) under the Department of Health and Human Services (HHS) has released an enhanced Security Risk Assessment (SRA)...
1 min read
Safeguarding protected health information (PHI) ensures patient privacy and compliance with HIPAA, and protects against breaches. It includes best...
3 min read
Insider threats put the healthcare industry's security and confidentiality of patient data at risk. Healthcare organizations often overlook potential...
2 min read
With the shift towards digital records, healthcare facilities rely on mobile devices to access and store patient data. These devices are prime...
3 min read
According to a study about the impacts of layoffs on cybersecurity breaches, companies may face an increased risk of cyberattacks after letting...
2 min read
A single breach can lead to significant financial losses, damage to reputation, and legal liabilities. Fortunately, proactive planning and robust...
2 min read
Cybercriminals are now using DocuSign’s Envelopes API to send fake invoices that look legitimate, bypassing usual email security checks.
2 min read
The latest cybersecurity newsletter from the Office for Civil Rights (OCR) has a clear message for healthcare organizations: social engineering...
4 min read
According to IBM, “Threat hunting, also known as cyberthreat hunting, is a proactive approach to identifying previously unknown, or ongoing...
3 min read
With a second term on the horizon, Trump’s cybersecurity policies could shape the future of US defenses against ransomware, business email...
1 min read
While HIPAA does not explicitly mention micro-segmentation, it is a security approach aligning with HIPAA’s security requirements by limiting access...
3 min read
Healthcare organizations face the challenge of protecting sensitive patient information. From personal identities to medical histories, this data is...