1 min read
The purpose of redaction in email chains
The purpose of redaction in email chains is to remove sensitive or confidential information before sharing the email with others. When employing this...
1 min read
The purpose of redaction in email chains is to remove sensitive or confidential information before sharing the email with others. When employing this...
4 min read
Identity has become a major target for cybercriminals, affecting organizations of all sizes, and particularly healthcare. High-profile incidents like...
5 min read
Social engineering, or when users are manipulated to reveal data by threat actors, is a major threat to healthcare. According to the Carahsoft 2021...
7 min read
Text messaging is a convenient and effective form of communication, but it also presents opportunities for cybercriminals to exploit unsuspecting...
2 min read
Implementing RBAC provides a structured, secure, and scalable way to manage user access across an organization. By defining roles, assigning...
2 min read
According to IBM, “Kerberoasting is a cyberattack that exploits the Kerberos authentication protocol. Threat actors steal Kerberos service tickets to...
4 min read
When discussing nontreatment purposes in healthcare, we’re referring to ways that protected health information (PHI) is used beyond direct patient...
2 min read
Automatic logoffs are designed to automatically sign users out of a system after a specified period of inactivity. This function is essential in...
3 min read
According to the Journal of Medical Systems study ‘Security Techniques for the Electronic Health Records’, “Breaches in physical safeguards are the...
4 min read
Selecting the right authentication types for healthcare systems keeps patient information secure while maintaining ease of access for authorized...
3 min read
The Health-ISAC’s Healthcare Heartbeat report discusses ransomware and cybercrime trends that could affect healthcare organizations. The resource...
1 min read
Vulnerabilities in email archiving include email spoofing and phishing attacks leading to unauthorized access or data tampering. These...
4 min read
Audit controls enable organizations to detect unauthorized access or unusual activity involving protected health information (PHI) or electronic...