Cybersecurity (3)

update symbol over keyboard for post Understanding thread hijacking for ‘account update’ phishing

2 min read

Understanding thread hijacking for ‘account update’ phishing

Hijacking communications between patients and providers often allows cybercriminals to extract information and solicit payments and other actions...

Read More
Image of red key lock for blog about FAQs: Access controls

2 min read

FAQs: Access controls

Access controls are the security protocols and measures that determine who can access specific resources, systems, or information within an...

Read More
Image of someone in a hoodie on a computer for blog about What is consent phishing (OAuth Exploits)? 

2 min read

What is consent phishing (OAuth Exploits)? 

Consent phishing, also known as OAuth Exploits, is a form of cyberattack that exploits the truth recipients place on popular applications. By...

Read More
digital lock for post Cybersecurity trends for 2024 and beyond

2 min read

Cybersecurity trends for 2025 and beyond

During the recent Safeguarding Health Information: Building Assurance through HIPAA Security conference, Rahul Gaitonde, HHS Cyber Security...

Read More
hands over red lock on computer for post HHS Cyber Threat Intelligence announces major threat actors in 2024

2 min read

HHS Cyber Threat Intelligence announces major threat actors in 2024

On October 23, 2024, the HHS Cyber Security Operations Cyber Threat Intelligence Branch released a list of notable cyber threat actors, including...

Read More
globe with blue digital points for post The risk of AI-driven cyberattacks in healthcare

2 min read

The risk of AI-driven cyberattacks in healthcare

The rapid development of Artificial Intelligence (AI) opens the way for more sophisticated and focused cyberattacks. On October 23, 2024, at the...

Read More
Image of puzzle for blog about Your guide to healthcare incident response

2 min read

Your guide to healthcare incident response

An incident response plan is a framework that equips healthcare organizations with the tools and protocols to manage and mitigate the impact of...

Read More
change healthcare logo for post Over 100 million impacted by Change Healthcare ransomware attack

2 min read

Over 100 million impacted by Change Healthcare ransomware attack

UnitedHealth has confirmed that the February ransomware attack on Change Healthcare exposed the personal and healthcare data of over 100 million...

Read More
BCHP logo for post Boston Children’s Health Physicians targeted in ransomware attack

2 min read

Boston Children’s Health Physicians targeted in ransomware attack

Boston Children’s Health Physicians (BCHP) fell victim to a ransomware attack involving an IT vendor. The attacker, the BianLian group, is now...

Read More
conference flyer for post Cybersecurity collaboration takes center stage at HIPAA Security 2024 conference

2 min read

Cybersecurity collaboration takes center stage at HIPAA Security 2024 conference

Officials from HHS and NIST focused on the importance of collaboration to enhance healthcare cybersecurity during the first day of the Safeguarding...

Read More
digital human outline for post HHS identifies healthcare’s most urgent cyber threats

2 min read

HHS identifies healthcare’s most urgent cyber threats

During the recent Safeguarding Health Information: Building Assurance through HIPAA Security conference, the HHS urged healthcare organizations to...

Read More
Image of security shield for article about MDR and its benefits

3 min read

MDR and its benefits

Healthcare organizations have faced an unprecedented surge in intrusion attempts, with a 50% increase in attacks compared to the previous year....

Read More
Image of email icon and security icon for blog about Identifying an email phishing attack

4 min read

Identifying an email phishing attack

Phishing attacks have become one of the most common cyber threats today, with hackers continuously refining their techniques to exploit unsuspecting...

Read More