Cybersecurity (2)

digital floating health icons

2 min read

Microsoft: Navigating the healthcare cyber threat landscape

During SANS CTI Summit Solutions Track 2025, Microsoft’s Director of Threat Intelligence Strategy, Sherrod DeGrippo, discussed the growing ransomware...

Read More
Image of shield with keyhole.

2 min read

Applying continuous threat management to email communication audits

Continuous threat management, or continuous threat exposure management (CTEM), is a cybersecurity strategy designed to mitigate threats across an...

Read More
Image of Internet search bar.

2 min read

What is real-time URL scanning?

Email security threats continue to evolve, with malicious URLs becoming increasingly sophisticated. According to research from Beijing Electronic...

Read More
Image of several people on computers in a meeting.

2 min read

Building healthcare security awareness programs

Healthcare organizations face unique cybersecurity challenges, from protecting patient data to maintaining HIPAA compliance. While technical controls...

Read More
Image of phone with a cloud over it.

2 min read

Securing healthcare data with Cloud Access Security Brokers (CASB)

Healthcare organizations are adopting cloud services for everything from electronic health records (EHR) to telehealth platforms. This migration...

Read More
Image of medical files in folders.

3 min read

Misuse of medical records

The misuse of medical records can take several forms, including unauthorized access, data breaches, fraud, and improper disclosure of patient...

Read More
Image of a chain link to signify blockchain nodes.

3 min read

What are nodes in blockchain?

According to a study published in Forbes, “The name blockchain is hardly accidental: The digital ledger is often described as a “chain” that’s made...

Read More
red digital lock

2 min read

CL0P Ransomware resurfaces, targeting telecom and healthcare sectors

The notorious CL0P ransomware group launched a new wave of attacks in early 2025, exploiting zero-day vulnerabilities to target telecommunications...

Read More
Image of someone using a computer mouse.

3 min read

What is clickjacking?

According to Forbes, “A clickjacking hack attack,simply explained, is one that employs various methods to get users clicking on invisible or...

Read More
Image of lock on a keyboard.

2 min read

What is NIST’s role in developing quantum-resistant cryptography?

The National Institute of Standards and Technology (NIST) has spearheaded the effort to standardize new encryption algorithms capable of withstanding...

Read More
Image of a certificate with a gold emblem.

2 min read

Certifications for healthcare privacy officers

In a recent MedTrainer’s article, Amber Ratcliffe writes, “In the rapidly evolving healthcare industry, adherence to regulations and ethical...

Read More
Image of shield with keyhole.

3 min read

The value of HIPAA compliant email for incident reporting

After the discovery of a data breach, a secure source of communication like HIPAA compliant email can become an invaluable resource for the extensive...

Read More
Image of computer desktops.

2 min read

How workstation policies improve security

Workstation policies dictate physical security measures like workstation placement, screen locking when unattended, and proper disposal of hardware....

Read More