Cybersecurity (3)

digital target

2 min read

A closer look at 2024’s top cyber targets

The IT sector According to the Microsoft Digital Defense Report 2024, IT was the most targeted sector by nation-state actors, accounting for 24% of...

Read More
Image of lock and keyboard for blog about Understanding and securing hashed passwords

2 min read

Understanding and securing hashed passwords

Your password is the first line of defense against unauthorized access to user accounts; however, the best practices for creating and securing them...

Read More
Image of someone in a hood for blog about The anatomy of a phishing attack

3 min read

The anatomy of a phishing attack

Phishing attacks remain one of the most common and effective email security threats, particularly targeting healthcare organizations. According to a...

Read More
Image of cloud for blog about Dentistry and unified cloud infrastructures

2 min read

Dentistry and unified cloud infrastructures

Historically, dental practices operated with paper records and standalone software systems that often resulted in information silos and...

Read More
Image of shield for blog about HIPAA penalties and responsibilities: what to do after a breach or violation

4 min read

HIPAA penalties and responsibilities: what to do after a breach or violation

The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for protecting sensitive patient data in the United States....

Read More
fingerprint with data and digital heads

3 min read

When is data replication a risk to patient data?

Data replication poses a risk to patient data when security measures are inconsistent across replicated sites, leading to potential unauthorized...

Read More
blue email icon with security lock

3 min read

Email security resolutions for healthcare organizations in the new year

As we step into 2025, healthcare organizations face increasing cybersecurity threats, with email remaining one of the most vulnerable attack vectors.

Read More
digital blue key

2 min read

The future of email encryption: Trends to watch

Email encryptionis evolving rapidly as cyber threats become more sophisticated and regulatory requirements grow stricter.

Read More
security lock digital

2 min read

Implementing a threat profile in your cybersecurity strategy

At the recent SANS CTI Summit Solutions Track 2025, held on January 27, experts gathered to discuss how threat profiles can strengthen Cyber Threat...

Read More
Image of someone on a computer for blog about Understanding the difference between TTPs and IoCs in cybersecurity

2 min read

Understanding the difference between TTPs and IoCs in cybersecurity

While both Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IoCs) are important components of threat detection, they serve...

Read More
floating healthcare icons

3 min read

Improving healthcare cybersecurity with the Cyber Kill Chain framework

"The Cyber Kill Chain offers a great starting point for developing a proactive security strategy that takes into account the cyber attacker mindset...

Read More
Image of people shaking hands for blog about The difference between a data use agreement and a business associate agreement

3 min read

Data use agreements versus business associate agreements

Both data use agreements and business associates agreements are used in healthcare for managing data responsibly, they serve distinct functions...

Read More
Image of shield for blog about Lessons learned from HIPAA compliance breaches

3 min read

Lessons learned from HIPAA compliance breaches

Healthcare data breaches continue to climb, with the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) tracking a...

Read More