Cybersecurity (3)

Image of different types of data, including health, for blog about What are de-identification forms?

2 min read

What are de-identification forms?

De-identification forms are documents or templates used to ensure that sensitive information, particularly personally identifiable information (PII)...

Read More
Image of lock on keyboard for blog about Common causes of data breaches

2 min read

Common causes of data breaches

Data breaches can occur for various reasons, often stemming from vulnerabilities in systems, processes, or human error. We’ll go over some of the...

Read More
Image of hacker for blog about How TTPs help organizations identify and combat cyber threats

2 min read

How TTPs help organizations identify and combat cyber threats

According to the National Institute of Standards and Technology (NIST), Tactics, Techniques, and Procedures (TTPs) represent the behavioral patterns...

Read More
Image of someone typing for blog about What is endpoint protection?

2 min read

What is endpoint protection?

Endpoint protection, also known as endpoint security, is the securing endpoints or entry points of end-user devices such as desktops, laptops,...

Read More
security lock on hospital graphic

2 min read

PIH Health ransomware breach exposes 17M records

Hackers claim to have exfiltrated 17 million patient records in a ransomware attack on PIH Health.

Read More
Image of locks for blog about What is deception technology?

3 min read

What is deception technology?

Deception technology is an innovative strategy for preventing cyberattacks. It involves creating a realistic decoy environment to divert...

Read More
Image of someone tapping a sign that says AI for blog about How AI is revolutionizing email breach detection and response

3 min read

How AI is revolutionizing email breach detection and response

Email-based threats have become one of the most pervasive cybersecurity challenges, affecting 90% of global organizations and causing an estimated...

Read More
hook and digital data

2 min read

Phishing attacks in healthcare: How to protect your organization in 2025

According to a study inBMJ Health Care Informatics, 2-3% of email and internet traffic in healthcare organizations is flagged as suspicious, equating...

Read More
digital code with zero day text

3 min read

What is a zero-day attack?

A zero-day exploit, also known as a zero-day threat, is an attack that targets a security vulnerability for which no patch or fix is available. The...

Read More
gloved hand on laptop

1 min read

What are attack surfaces and how do cybercriminals exploit them?

Attack surfaces are all the points where an unauthorized user can access a system and extract data. Cloudflare states, “It is essentially like all...

Read More
digital concept of cybersecurity blue

2 min read

What is an incident response plan?

An incident response plan (IRP) is a well-structured approach that outlines how an organization prepares for, detects, responds to, and recovers from...

Read More
blue digital security lock

3 min read

Differences between an IDS and IPS

According to a study by Georgia State University, an Intrusion Detection System (IDS) is designed to monitor network traffic or system activities for...

Read More
blue shield

2 min read

What is the difference between IOCs and IOAs?

Detecting a cyber threat requires threat intelligence, and the National Cyber Security Centre (NCSC) defines this as "evidence-based knowledge,...

Read More