Cybersecurity (16)

Image of a stack of paper for blog on What are nonrepudiation controls?

1 min read

What are nonrepudiation controls?

Nonrepudiation controls are security measures that ensure individuals cannot deny responsibility for their actions or communications in a system. In...

Read More
Image of someone's back facing the viewer for a blog about DDos attacks and their impact on HIPAA compliance

2 min read

DDos attacks and their impact on HIPAA compliance

A distributed denial-of-service (DDoS) attack impacts HIPAA compliance by disrupting the availability of protected health information (PHI), a...

Read More
Image of lock on keyboard for aticle about what is a pass-the-hash attack?

3 min read

What is a pass-the-hash attack?

According to Crowdstrike, “Pass-the-hash (PtH) is a type of cybersecurity attack in which an adversary steals a “hashed” user credential and uses it...

Read More
shelves of paper medical records for post Why certain hospitals have a higher risk of violating HIPAA

3 min read

Why certain hospitals have a higher risk of violating HIPAA

Hospitals must prevent HIPAA violations using an advanced cybersecurity framework, staff training, and behavioral policies.

Read More
Image of phone and laptop for blog about Understanding contextual multi-factor authentication (MFA)

3 min read

Understanding contextual multi-factor authentication (MFA)

Contextual multi-factor authentication (MFA), also known as adaptive authentication, is an advanced security approach that adjusts authentication...

Read More
Image of the world for blog about Understanding data sovereignty

2 min read

Understanding data sovereignty

A journal article published in Big Data & Society states that data sovereignty “typically relates in some way to meaningful control, ownership, and...

Read More
Image of someone texting for a blog about what is text bombing?

4 min read

What is text bombing?

Text bombing is a type of cyber harassment where someone sends a large number of unsolicited text messages to a target's phone in a short period....

Read More
Image of text with some parts blacked out for blog on the purpose of redaction in email chains

1 min read

The purpose of redaction in email chains

The purpose of redaction in email chains is to remove sensitive or confidential information before sharing the email with others. When employing this...

Read More
Image of shield for blog on top identity threats facing healthcare organizations

4 min read

Top identity threats facing healthcare organizations

Identity has become a major target for cybercriminals, affecting organizations of all sizes, and particularly healthcare. High-profile incidents like...

Read More
Graphic of person in hoodie on a computer for blog post on social engineering threats in healthcare

5 min read

Social engineering threats in healthcare

Social engineering, or when users are manipulated to reveal data by threat actors, is a major threat to healthcare. According to the Carahsoft 2021...

Read More
Common text messaging cyberattacks

7 min read

Common text messaging cyberattacks

Text messaging is a convenient and effective form of communication, but it also presents opportunities for cybercriminals to exploit unsuspecting...

Read More
Implementing RBAC

2 min read

Implementing RBAC

Implementing RBAC provides a structured, secure, and scalable way to manage user access across an organization. By defining roles, assigning...

Read More
What is Kerberoasting?

2 min read

What is Kerberoasting?

According to IBM, “Kerberoasting is a cyberattack that exploits the Kerberos authentication protocol. Threat actors steal Kerberos service tickets to...

Read More