8 min read
Cybersecurity (20)
2 min read
Atrium Health faces data breach
On September 13, 2024, Atrium Health confirmed a data breach linked to a phishing attack. The incident has raised concerns about the security of...
1 min read
What is a virtual network function?
Network function virtualization is a technology that transforms traditional network functions from hardware-based solutions into software...
2 min read
Deepfake technology in social engineering attacks
The term deepfake stems from combining “deep learning,” a subset of machine learning, and “fake,” reflecting the technology's ability to produce...
1 min read
What are predictive analytics exploits?
Predictive analytics exploits are techniques that analyze historical data to forecast future events, helping organizations make informed decisions...
4 min read
Incident reports in the compliance reporting process
Healthcare settings are inherently prone to accidents and incidents that can impact patients and organizations. Maintaining an incident reporting...
1 min read
When are shadow records a risk to healthcare cybersecurity?
Shadow records are patient records in systems separate from themain patient record systems in healthcare organizations. These systems are often...
2 min read
Who should notify patients when a data breach happens?
A covered entity should notify patients directly when a data breach involves their PHI.
3 min read
2024 OCR cybersecurity newsletter
As cyberattacks and data breaches increase, improving physical security in healthcare facilities is necessary. HIPAA-covered entities and business...
4 min read
Understanding DNS configurations for email security
Email is a common communication tool, but it also attracts malicious actors. To strengthen your email security, focus on Domain Name System (DNS)...
1 min read
What is rate limiting?
Rate limiting controls the number of requests made from an API to promote fair access, and maintain peak performance.
1 min read
What are blind signatures?
A blind signature is a cryptographic method that hides the content of a message while it is being signed. It’s often used when the sender wants to...
2 min read
CISA unveils new reporting portal for threat response
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has rolled out a new portal to improve how cyber incidents and data breaches are...