3 min read
Cybersecurity trends and threats in healthcare
The Health-ISAC’s Healthcare Heartbeat report discusses ransomware and cybercrime trends that could affect healthcare organizations. The resource...
3 min read
The Health-ISAC’s Healthcare Heartbeat report discusses ransomware and cybercrime trends that could affect healthcare organizations. The resource...
1 min read
Vulnerabilities in email archiving include email spoofing and phishing attacks leading to unauthorized access or data tampering. These...
4 min read
Audit controls enable organizations to detect unauthorized access or unusual activity involving protected health information (PHI) or electronic...
4 min read
The year 2024 has seen a notable increase in data breaches, with many companies and institutions falling victim to cyberattacks. These incidents have...
2 min read
On September 13, 2024, Atrium Health confirmed a data breach linked to a phishing attack. The incident has raised concerns about the security of...
1 min read
Network function virtualization is a technology that transforms traditional network functions from hardware-based solutions into software...
2 min read
The term deepfake stems from combining “deep learning,” a subset of machine learning, and “fake,” reflecting the technology's ability to produce...
1 min read
Predictive analytics exploits are techniques that analyze historical data to forecast future events, helping organizations make informed decisions...
4 min read
Healthcare settings are inherently prone to accidents and incidents that can impact patients and organizations. Maintaining an incident reporting...
1 min read
Shadow records are patient records in systems separate from themain patient record systems in healthcare organizations. These systems are often...
2 min read
A covered entity should notify patients directly when a data breach involves their PHI.
3 min read
As cyberattacks and data breaches increase, improving physical security in healthcare facilities is necessary. HIPAA-covered entities and business...