Cybersecurity (2)

Image of someone using a computer mouse.

3 min read

What is clickjacking?

According to Forbes, “A clickjacking hack attack,simply explained, is one that employs various methods to get users clicking on invisible or...

Read More
Image of lock on a keyboard.

2 min read

What is NIST’s role in developing quantum-resistant cryptography?

The National Institute of Standards and Technology (NIST) has spearheaded the effort to standardize new encryption algorithms capable of withstanding...

Read More
Image of a certificate with a gold emblem.

2 min read

Certifications for healthcare privacy officers

In a recent MedTrainer’s article, Amber Ratcliffe writes, “In the rapidly evolving healthcare industry, adherence to regulations and ethical...

Read More
Image of shield with keyhole.

3 min read

The value of HIPAA compliant email for incident reporting

After the discovery of a data breach, a secure source of communication like HIPAA compliant email can become an invaluable resource for the extensive...

Read More
Image of computer desktops.

2 min read

How workstation policies improve security

Workstation policies dictate physical security measures like workstation placement, screen locking when unattended, and proper disposal of hardware....

Read More
Image of someone typing an email.

3 min read

Understanding modern email thread hijacking

Email thread hijacking has evolved from simple reply-chain spam to a sophisticated attack vector that poses significant risks to healthcare...

Read More
Image of web browser.

3 min read

The threat of web application attacks

Healthcare organizations rely on web applications for their operations, including Electronic Health Records (EHR), patient portals, telehealth...

Read More
hacker

3 min read

How attackers weaponize legitimate system tools

Cybercriminals use legitimate system administration tools and built-in operating system features to conduct attacks, a technique known as "Living off...

Read More
QR codes on phone

3 min read

The rise of QR code phishing in healthcare

Healthcare organizations face a growing security threat as cybercriminals leverage QR codes in phishing attacks. This emerging trend, known as...

Read More
Image of someone typing a password into a computer.

1 min read

What are access controls?

Access controls are a security mechanism that regulates who or what can view, use, or modify resources in a system. They ensure only authorized...

Read More
Image of shield with a keyhole.

2 min read

What is blockchain based data validation?

Blockchain based data validation is an immutable method of securing data integrity. Through the use of blockchain technology properties, data...

Read More
image of different domain types, like .com, .org, and .edu.

4 min read

What is cybersquatting?

Cybersquatting refers to registering, using, or selling a domain name with the intent of profiting from the trademarked name of another entity. The...

Read More
Image of laptop with lock.

2 min read

Implementing DMARC for healthcare email security

Domain-based Message Authentication, Reporting, and Conformance (DMARC) represents the final piece in modern email authentication. For healthcare...

Read More