Cybersecurity (5)

Image of code of data for blog about How do cybercriminals use stolen data?

2 min read

How do cybercriminals use stolen data?

Cybercriminals use stolen data for many malicious purposes, like financial gain, extortion, and more.

Read More
hacker at computer with digital code and russian flag

3 min read

Why Russia is often linked to ransomware cases

Russia frequently appears in discussions about cyber attacks, and for good reason. The country’s geopolitical climate, legal policies, and thriving...

Read More
Image of lock for blog about What are strong security practices?

2 min read

What are strong security practices?

Strong security practices and methodologies, such as email authentication, are advisable to protect organizations from cyber threats. These are...

Read More
Image of shield for blog about What are HIPAA audit controls?

2 min read

What are HIPAA audit controls?

HIPAA audit controls refer to the mechanisms and policies covered entities and business associates implement to track and monitor access to...

Read More
Image of locked computer for blog about Access control vs Audit control

2 min read

Access controls vs Audit controls

Access control ensures that only authorized users can interact with systems and data, while audit control provides visibility and accountability...

Read More
blood supply bags with barcode

2 min read

FDA urges blood suppliers to improve cyber defenses

The US Food and Drug Administration (FDA) recently called on blood suppliers to increase their cybersecurity to safeguard the safety and integrity of...

Read More
Image of locks for blog about Managing technological and physical risk

1 min read

Managing technological and physical risks

Technological risks are the vulnerabilities arising from digital infrastructure. Meanwhile, physical risks are threats that could lead to physical...

Read More
Image of data storage for blog about How to secure central storage devices

2 min read

How to secure central storage devices

Organizations must secure any vulnerabilities in central storage devices. Security requirements may depend on the device and the organization, as...

Read More
Image of calculator for blog about What is a cost-benefit analysis?

2 min read

What is a cost-benefit analysis?

Cost-benefit analyses (CBAs) are rooted in economic evaluation, assigning monetary values to both costs and benefits. It can be applied to risk...

Read More
Image of magnifying glass for blog about The uses of control analyses in email policy control

2 min read

The uses of control analyses in email

Control analysis is a way for healthcare organizations to test the technical safeguards required by the HIPAA Security Rule. The test itself extends...

Read More
Image of shield for blog about What are forensic protocols?

2 min read

What are forensic protocols?

Forensic protocols are procedures and guidelines used to provide an accurate analysis of evidence in legal and investigative scenarios. These...

Read More
Image of tiles falling over for blog about Does vulnerability management have a place in healthcare?

2 min read

Does vulnerability management have a place in healthcare?

Vulnerability management is the process of identifying, evaluating, treating, and reporting security vulnerabilities in systems and software, which...

Read More
Image of lock for blog about What is a threat intelligence platform?  

5 min read

What is a threat intelligence platform?

Cyber threat actors are constantly developing new tools and techniques to bypass existing defenses, putting organizations at risk of security...

Read More