Cybersecurity (7)

Safeguarding privacy amidst increasing data breaches

4 min read

Safeguarding privacy amidst increasing data breaches

The year 2024 has seen a notable increase in data breaches, with many companies and institutions falling victim to cyberattacks. These incidents have...

Read More
Cybersecurity 101

8 min read

Cybersecurity 101

Read More
Atrium Health faces data breach

2 min read

Atrium Health faces data breach

On September 13, 2024, Atrium Health confirmed a data breach linked to a phishing attack. The incident has raised concerns about the security of...

Read More
What is a virtual network function?

1 min read

What is a virtual network function?

Network function virtualization is a technology that transforms traditional network functions from hardware-based solutions into software...

Read More
Deepfake technology in social engineering attacks

2 min read

Deepfake technology in social engineering attacks

The term deepfake stems from combining “deep learning,” a subset of machine learning, and “fake,” reflecting the technology's ability to produce...

Read More
What are predictive analytics exploits?

1 min read

What are predictive analytics exploits?

Predictive analytics exploits are techniques that analyze historical data to forecast future events, helping organizations make informed decisions...

Read More
Incident reports in the compliance reporting process

4 min read

Incident reports in the compliance reporting process

Healthcare settings are inherently prone to accidents and incidents that can impact patients and organizations. Maintaining an incident reporting...

Read More
When are shadow records a risk to healthcare cybersecurity?

1 min read

When are shadow records a risk to healthcare cybersecurity?

Shadow records are patient records in systems separate from themain patient record systems in healthcare organizations. These systems are often...

Read More
Who should notify patients when a data breach happens?

2 min read

Who should notify patients when a data breach happens?

A covered entity should notify patients directly when a data breach involves their PHI.

Read More
2024 OCR cybersecurity newsletter

3 min read

2024 OCR cybersecurity newsletter

As cyberattacks and data breaches increase, improving physical security in healthcare facilities is necessary. HIPAA-covered entities and business...

Read More
Understanding DNS configurations for email security

4 min read

Understanding DNS configurations for email security

Email is a common communication tool, but it also attracts malicious actors. To strengthen your email security, focus on Domain Name System (DNS)...

Read More
What is rate limiting?

1 min read

What is rate limiting?

Rate limiting controls the number of requests made from an API to promote fair access, and maintain peak performance.

Read More
What are blind signatures?

1 min read

What are blind signatures?

A blind signature is a cryptographic method that hides the content of a message while it is being signed. It’s often used when the sender wants to...

Read More