Cybersecurity (2)

Image of binder for blog about SOPs for sending HIPAA compliant email

2 min read

SOPs for sending HIPAA compliant email

Standard operating procedures (SOPs) for HIPAA compliant email ensure organizations meet the privacy and security requirements mandated by the Health...

Read More
red computer data lines

2 min read

The role of Google's Red Team in securing AI development

Google's Red Team represents a major component in the company's approach to AI security, working to identify and address potential vulnerabilities...

Read More
Image of power lines for blog about How does an emergency access procedure work?

2 min read

How does an emergency access procedure work?

Emergency access procedures are protocols that take place during unforeseen circumstances threatening the availability of electronic protected health...

Read More
Image of icons related to technology, like email and WiFi for blog about The role of AI in detecting zero-day attacks

1 min read

The role of AI in detecting zero-day attacks

Artificial Intelligence is transforming cybersecurity's approach to zero-day attack detection. Unlike traditional security measures that rely on...

Read More
Image of lock for blog about FAQs: All things phishing

2 min read

FAQs: All things phishing

Phishing is a cyberattack where criminals attempt to deceive individuals into sharing sensitive information, such as passwords, credit card details,...

Read More
Image of lock for blog about What is static application security testing?

2 min read

What is static application security testing?

Static application security testing operates as a “white box” testing approach, meaning it analyzes an application's internal workings by examining...

Read More
Image of emails for blog about What is vulnerability testing?

2 min read

What is vulnerability testing?

Vulnerability testing is a part of cybersecurity that operates through the systematic identification, evaluation, and addressing of weaknesses in...

Read More
Image of someone at a computer for blog about What is fake hacking, and why should you care?

2 min read

What is fake hacking and why should you care?

Fake hacking is when someone pretends to hack your computer or system to scare you. It’s not the same as real hacking, where someone breaks into your...

Read More
Image of shield for blog about Understanding cybersecurity performance goals 

2 min read

Understanding cybersecurity performance goals 

Released in January 2024, the HHS Cybersecurity Performance Goals (CPGs) are designed to help healthcare organizations prioritize necessary security...

Read More
Image of shield for blog about What is NIST compliance

3 min read

What is NIST compliance

The National Institute of Standards and Technology (NIST) helps organizations strengthen their cybersecurity practices. Federal agencies,...

Read More
2025 digital image

5 min read

Avoiding HIPAA violations in 2025: Lessons learned from past breaches

The Health Insurance Portability and Accountability Act (HIPAA) is a US law designed to protect patient privacy and secure medical information. It...

Read More
Image of lock for blog about Preventing unauthorized access

2 min read

Preventing unauthorized access

Preventing unauthorized access involves implementing security measures to protect systems, data, and physical assets.

Read More
back of computer server

3 min read

Do hospitals still use onsite data centers?

Hospitals still use onsite physical data centers but are largely switching to cloud-based and/or hybrid models. Onsite data centers are housed in a...

Read More