Cybersecurity (18)

Image of text with some parts blacked out for blog on the purpose of redaction in email chains

1 min read

The purpose of redaction in email chains

The purpose of redaction in email chains is to remove sensitive or confidential information before sharing the email with others. When employing this...

Read More
Image of shield for blog on top identity threats facing healthcare organizations

4 min read

Top identity threats facing healthcare organizations

Identity has become a major target for cybercriminals, affecting organizations of all sizes, and particularly healthcare. High-profile incidents like...

Read More
Graphic of person in hoodie on a computer for blog post on social engineering threats in healthcare

5 min read

Social engineering threats in healthcare

Social engineering, or when users are manipulated to reveal data by threat actors, is a major threat to healthcare. According to the Carahsoft 2021...

Read More
Common text messaging cyberattacks

7 min read

Common text messaging cyberattacks

Text messaging is a convenient and effective form of communication, but it also presents opportunities for cybercriminals to exploit unsuspecting...

Read More
Implementing RBAC

2 min read

Implementing RBAC

Implementing RBAC provides a structured, secure, and scalable way to manage user access across an organization. By defining roles, assigning...

Read More
What is Kerberoasting?

2 min read

What is Kerberoasting?

According to IBM, “Kerberoasting is a cyberattack that exploits the Kerberos authentication protocol. Threat actors steal Kerberos service tickets to...

Read More
PHI use for nontreatment purposes

4 min read

PHI use in nontreatment purposes

When discussing nontreatment purposes in healthcare, we’re referring to ways that protected health information (PHI) is used beyond direct patient...

Read More
Understanding automatic logoffs

2 min read

Understanding automatic logoffs

Automatic logoffs are designed to automatically sign users out of a system after a specified period of inactivity. This function is essential in...

Read More
Physical safeguards for email servers

3 min read

Physical safeguards for email servers

According to the Journal of Medical Systems study ‘Security Techniques for the Electronic Health Records’, “Breaches in physical safeguards are the...

Read More
Choosing authentication types for healthcare

4 min read

Choosing authentication types for healthcare

Selecting the right authentication types for healthcare systems keeps patient information secure while maintaining ease of access for authorized...

Read More
Cybersecurity trends and threats in healthcare

3 min read

Cybersecurity trends and threats in healthcare

The Health-ISAC’s Healthcare Heartbeat report discusses ransomware and cybercrime trends that could affect healthcare organizations. The resource...

Read More
Vulnerabilities in email archiving

1 min read

Vulnerabilities in email archiving

Vulnerabilities in email archiving include email spoofing and phishing attacks leading to unauthorized access or data tampering. These...

Read More
Audit control in HIPAA compliance

4 min read

Audit control in HIPAA compliance

Audit controls enable organizations to detect unauthorized access or unusual activity involving protected health information (PHI) or electronic...

Read More