Cybersecurity (6)

digital globe with floating lock icons

2 min read

What are nation states?

Nation states are groups or organizations affiliated with a government that direct cyber operations in a way that advances their national interest....

Read More
Image of lock for for blog about Implementing cyber hygiene practices in your organization

2 min read

Implementing cyber hygiene practices in your organization

The healthcare industry has seen a gradual increase in data breaches “involving the loss of 500 or more records” from 2009 to 2024. These breaches...

Read More
Image of someone typing for blog about Balancing real-time messaging and documentantion requirements under HIPAA

2 min read

Balancing real-time messaging and documentantion requirements

Real-time messaging and documentation can simplify communication, improve care coordination, and ensure accurate, up-to-date patient records,...

Read More
Image of lock for blog about What is RSA encryption?

3 min read

What is RSA encryption?

What is RSA encryption? Rivest–Shamir–Adleman (RSA) encryption is an asymmetric cryptographic algorithm that enables secure data transmission. It...

Read More
hacker at computer with red code

2 min read

What is a web shell?

A web shell is a malicious script that cybercriminals can use to execute arbitrary commands on a compromised server. Web shells can lead to data...

Read More
Image of mouse and laptop for blog about What is rate limiting?

3 min read

What is rate limiting?

Rate limiting is a versatile technique employed to regulate the frequency of user or application interactions with a web property. It can protect...

Read More
Image of lock for blog about What is shadow data?

3 min read

What is shadow data?

Shadow data refers to data created, stored, or used outside officially sanctioned IT systems or governance frameworks. It typically includes files,...

Read More
CISA logo

1 min read

The impact of the CISA Shields Up program on healthcare organizations

The CISA Shields Up program is an initiative designed to bolster the national cybersecurity defenses by encouraging individuals, organizations, and...

Read More
red digital keys with computer code

2 min read

How to detect and identify insider threats

The healthcare sector can be a goldmine for valuable data, making it a prime target for exploitation. Employees may intentionally or accidentally...

Read More
Image of someone in a hoody for blog about What is destructive malware? 

1 min read

What is destructive malware?

Threat actors often choose to exploit the most commonly accessed and least protected points of entry into the networks of the organizations they...

Read More
Department of health and human services logo

2 min read

OCR unveils updated security risk assessment tool

The Office for Civil Rights (OCR) under the Department of Health and Human Services (HHS) has released an enhanced Security Risk Assessment (SRA)...

Read More
Image of shield for blog about Safeguarding PHI

1 min read

Safeguarding PHI

Safeguarding protected health information (PHI) ensures patient privacy and compliance with HIPAA, and protects against breaches. It includes best...

Read More
digital concept of gray security shield

3 min read

How do we protect patient data against insider threats?

Insider threats put the healthcare industry's security and confidentiality of patient data at risk. Healthcare organizations often overlook potential...

Read More