Cybersecurity (2)

Image of phone with a cloud over it.

2 min read

Securing healthcare data with Cloud Access Security Brokers (CASB)

Healthcare organizations are adopting cloud services for everything from electronic health records (EHR) to telehealth platforms. This migration...

Read More
Image of medical files in folders.

3 min read

Misuse of medical records

The misuse of medical records can take several forms, including unauthorized access, data breaches, fraud, and improper disclosure of patient...

Read More
Image of a chain link to signify blockchain nodes.

3 min read

What are nodes in blockchain?

According to a study published in Forbes, “The name blockchain is hardly accidental: The digital ledger is often described as a “chain” that’s made...

Read More
red digital lock

2 min read

CL0P Ransomware resurfaces, targeting telecom and healthcare sectors

The notorious CL0P ransomware group launched a new wave of attacks in early 2025, exploiting zero-day vulnerabilities to target telecommunications...

Read More
Image of someone using a computer mouse.

3 min read

What is clickjacking?

According to Forbes, “A clickjacking hack attack,simply explained, is one that employs various methods to get users clicking on invisible or...

Read More
Image of lock on a keyboard.

2 min read

What is NIST’s role in developing quantum-resistant cryptography?

The National Institute of Standards and Technology (NIST) has spearheaded the effort to standardize new encryption algorithms capable of withstanding...

Read More
Image of a certificate with a gold emblem.

2 min read

Certifications for healthcare privacy officers

In a recent MedTrainer’s article, Amber Ratcliffe writes, “In the rapidly evolving healthcare industry, adherence to regulations and ethical...

Read More
Image of shield with keyhole.

3 min read

The value of HIPAA compliant email for incident reporting

After the discovery of a data breach, a secure source of communication like HIPAA compliant email can become an invaluable resource for the extensive...

Read More
Image of computer desktops.

2 min read

How workstation policies improve security

Workstation policies dictate physical security measures like workstation placement, screen locking when unattended, and proper disposal of hardware....

Read More
Image of someone typing an email.

3 min read

Understanding modern email thread hijacking

Email thread hijacking has evolved from simple reply-chain spam to a sophisticated attack vector that poses significant risks to healthcare...

Read More
Image of web browser.

3 min read

The threat of web application attacks

Healthcare organizations rely on web applications for their operations, including Electronic Health Records (EHR), patient portals, telehealth...

Read More
hacker

3 min read

How attackers weaponize legitimate system tools

Cybercriminals use legitimate system administration tools and built-in operating system features to conduct attacks, a technique known as "Living off...

Read More
QR codes on phone

3 min read

The rise of QR code phishing in healthcare

Healthcare organizations face a growing security threat as cybercriminals leverage QR codes in phishing attacks. This emerging trend, known as...

Read More