2 min read
October OCR cybersecurity newsletter warns of social engineering attacks
The latest cybersecurity newsletter from the Office for Civil Rights (OCR) has a clear message for healthcare organizations: social engineering...
2 min read
The latest cybersecurity newsletter from the Office for Civil Rights (OCR) has a clear message for healthcare organizations: social engineering...
4 min read
According to IBM, “Threat hunting, also known as cyberthreat hunting, is a proactive approach to identifying previously unknown, or ongoing...
3 min read
With a second term on the horizon, Trump’s cybersecurity policies could shape the future of US defenses against ransomware, business email...
1 min read
While HIPAA does not explicitly mention micro-segmentation, it is a security approach aligning with HIPAA’s security requirements by limiting access...
3 min read
Healthcare organizations face the challenge of protecting sensitive patient information. From personal identities to medical histories, this data is...
2 min read
405(d) is a program targeted at tackling the prevalent cybersecurity threat healthcare organizations face nationwide. The program aims to provide...
2 min read
The HHS/NIST conference, titled Safeguarding Health Information: Building Assurance through HIPAA Security 2024, took place on October 24, 2024, in...
3 min read
With 328.77 million terabytes of data created daily, it's no surprise that cyber threats are on the rise, as criminals look to exploit this valuable...
2 min read
Quishing is a cyber threat that exploits QR codes and phishing in deceptive emails, posing risks like data breaches and malware infections. The HC3...
2 min read
Cybersecurity performance goals (CPGs) are a set of cybersecurity best practices and minimum-security standards developed by the Cybersecurity and...
2 min read
Machine-in-the-middle attacks, often called "man-in-the-middle" (MitM) attacks, occur when an attacker intercepts communication between two parties...
2 min read
People are often lulled into a sense of security by familiar domains, leading to accessing websites and communications without much thought. Threat...
2 min read
Network segmentation is a security practice that involves dividing a computer network into smaller, manageable sub-networks (segments). This approach...