2 min read
What is the 405(d) effort?
405(d) is a program targeted at tackling the prevalent cybersecurity threat healthcare organizations face nationwide. The program aims to provide...
2 min read
405(d) is a program targeted at tackling the prevalent cybersecurity threat healthcare organizations face nationwide. The program aims to provide...
2 min read
The HHS/NIST conference, titled Safeguarding Health Information: Building Assurance through HIPAA Security 2024, took place on October 24, 2024, in...
3 min read
With 328.77 million terabytes of data created daily, it's no surprise that cyber threats are on the rise, as criminals look to exploit this valuable...
2 min read
Quishing is a cyber threat that exploits QR codes and phishing in deceptive emails, posing risks like data breaches and malware infections. The HC3...
2 min read
Cybersecurity performance goals (CPGs) are a set of cybersecurity best practices and minimum-security standards developed by the Cybersecurity and...
2 min read
Machine-in-the-middle attacks, often called "man-in-the-middle" (MitM) attacks, occur when an attacker intercepts communication between two parties...
2 min read
People are often lulled into a sense of security by familiar domains, leading to accessing websites and communications without much thought. Threat...
2 min read
Network segmentation is a security practice that involves dividing a computer network into smaller, manageable sub-networks (segments). This approach...
2 min read
Hijacking communications between patients and providers often allows cybercriminals to extract information and solicit payments and other actions...
2 min read
Access controls are the security protocols and measures that determine who can access specific resources, systems, or information within an...
2 min read
Consent phishing, also known as OAuth Exploits, is a form of cyberattack that exploits the truth recipients place on popular applications. By...
2 min read
During the recent Safeguarding Health Information: Building Assurance through HIPAA Security conference, Rahul Gaitonde, HHS Cyber Security...
2 min read
On October 23, 2024, the HHS Cyber Security Operations Cyber Threat Intelligence Branch released a list of notable cyber threat actors, including...