3 min read
What is clickjacking?
According to Forbes, “A clickjacking hack attack,simply explained, is one that employs various methods to get users clicking on invisible or...
3 min read
According to Forbes, “A clickjacking hack attack,simply explained, is one that employs various methods to get users clicking on invisible or...
2 min read
The National Institute of Standards and Technology (NIST) has spearheaded the effort to standardize new encryption algorithms capable of withstanding...
2 min read
In a recent MedTrainer’s article, Amber Ratcliffe writes, “In the rapidly evolving healthcare industry, adherence to regulations and ethical...
3 min read
After the discovery of a data breach, a secure source of communication like HIPAA compliant email can become an invaluable resource for the extensive...
2 min read
Workstation policies dictate physical security measures like workstation placement, screen locking when unattended, and proper disposal of hardware....
3 min read
Email thread hijacking has evolved from simple reply-chain spam to a sophisticated attack vector that poses significant risks to healthcare...
3 min read
Healthcare organizations rely on web applications for their operations, including Electronic Health Records (EHR), patient portals, telehealth...
3 min read
Cybercriminals use legitimate system administration tools and built-in operating system features to conduct attacks, a technique known as "Living off...
3 min read
Healthcare organizations face a growing security threat as cybercriminals leverage QR codes in phishing attacks. This emerging trend, known as...
1 min read
Access controls are a security mechanism that regulates who or what can view, use, or modify resources in a system. They ensure only authorized...
2 min read
Blockchain based data validation is an immutable method of securing data integrity. Through the use of blockchain technology properties, data...
4 min read
Cybersquatting refers to registering, using, or selling a domain name with the intent of profiting from the trademarked name of another entity. The...
2 min read
Domain-based Message Authentication, Reporting, and Conformance (DMARC) represents the final piece in modern email authentication. For healthcare...