Cybersecurity (13)

medical symbol in blue digital environment for post What is the 405(d) effort?

2 min read

What is the 405(d) effort?

405(d) is a program targeted at tackling the prevalent cybersecurity threat healthcare organizations face nationwide. The program aims to provide...

Read More
digital lock for post Top cybersecurity focus areas revealed at HHS and NIST conference

2 min read

Top cybersecurity focus areas revealed at HHS and NIST conference

The HHS/NIST conference, titled Safeguarding Health Information: Building Assurance through HIPAA Security 2024, took place on October 24, 2024, in...

Read More
Image of lock for blog about Best practices for secure data management

3 min read

Best practices for secure data management

With 328.77 million terabytes of data created daily, it's no surprise that cyber threats are on the rise, as criminals look to exploit this valuable...

Read More
red qr code on keyboard

2 min read

How to create a defense strategy against quishing

Quishing is a cyber threat that exploits QR codes and phishing in deceptive emails, posing risks like data breaches and malware infections. The HC3...

Read More
Image of lock for blog about What are cybersecurity performance goals (CPGs)?

2 min read

What are cybersecurity performance goals (CPGs)?

Cybersecurity performance goals (CPGs) are a set of cybersecurity best practices and minimum-security standards developed by the Cybersecurity and...

Read More
Image of someone in a hoodie on a computer for blog about What is a machine-in-the-middle attack?

2 min read

What is a machine-in-the-middle attack?

Machine-in-the-middle attacks, often called "man-in-the-middle" (MitM) attacks, occur when an attacker intercepts communication between two parties...

Read More
digital globe with web domain space for post What are homograph domain attacks?

2 min read

What are homograph domain attacks? 

People are often lulled into a sense of security by familiar domains, leading to accessing websites and communications without much thought. Threat...

Read More
digital lock for post What is network segmentation?

2 min read

What is network segmentation?

Network segmentation is a security practice that involves dividing a computer network into smaller, manageable sub-networks (segments). This approach...

Read More
update symbol over keyboard for post Understanding thread hijacking for ‘account update’ phishing

2 min read

Understanding thread hijacking for ‘account update’ phishing

Hijacking communications between patients and providers often allows cybercriminals to extract information and solicit payments and other actions...

Read More
Image of red key lock for blog about FAQs: Access controls

2 min read

FAQs: Access controls

Access controls are the security protocols and measures that determine who can access specific resources, systems, or information within an...

Read More
Image of someone in a hoodie on a computer for blog about What is consent phishing (OAuth Exploits)? 

2 min read

What is consent phishing (OAuth Exploits)? 

Consent phishing, also known as OAuth Exploits, is a form of cyberattack that exploits the truth recipients place on popular applications. By...

Read More
digital lock for post Cybersecurity trends for 2024 and beyond

2 min read

Cybersecurity trends for 2025 and beyond

During the recent Safeguarding Health Information: Building Assurance through HIPAA Security conference, Rahul Gaitonde, HHS Cyber Security...

Read More
hands over red lock on computer for post HHS Cyber Threat Intelligence announces major threat actors in 2024

2 min read

HHS Cyber Threat Intelligence announces major threat actors in 2024

On October 23, 2024, the HHS Cyber Security Operations Cyber Threat Intelligence Branch released a list of notable cyber threat actors, including...

Read More