Cybersecurity (7)

Image of tablet, laptop, and phone, for blog about how to handle the threat of lost devices 

2 min read

How to handle the threat of lost devices 

With the shift towards digital records, healthcare facilities rely on mobile devices to access and store patient data. These devices are prime...

Read More
Image of lock for blog about Preventing cyberattacks after layoffs

3 min read

Preventing cyberattacks after layoffs

According to a study about the impacts of layoffs on cybersecurity breaches, companies may face an increased risk of cyberattacks after letting...

Read More
Image of checklist for blog about Preparing for a cyberattack

2 min read

Preparing for a cyberattack

A single breach can lead to significant financial losses, damage to reputation, and legal liabilities. Fortunately, proactive planning and robust...

Read More
docusign logo for post The threat of fake invoices: Understanding DocuSign Envelopes API abuse

2 min read

The threat of fake invoices: Understanding DocuSign Envelopes API abuse

Cybercriminals are now using DocuSign’s Envelopes API to send fake invoices that look legitimate, bypassing usual email security checks.

Read More
blue digital lock for post October OCR cybersecurity newsletter warns of social engineering attacks

2 min read

October OCR cybersecurity newsletter warns of social engineering attacks

The latest cybersecurity newsletter from the Office for Civil Rights (OCR) has a clear message for healthcare organizations: social engineering...

Read More
digital lock on computer for post What is threat hunting?

4 min read

What is threat hunting?

According to IBM, “Threat hunting, also known as cyberthreat hunting, is a proactive approach to identifying previously unknown, or ongoing...

Read More
american flags on digital background for post How Trump’s re-election could impact US cybersecurity

3 min read

How Trump’s re-election could impact US cybersecurity

With a second term on the horizon, Trump’s cybersecurity policies could shape the future of US defenses against ransomware, business email...

Read More
Image of individuals and computers to represent a network for blog about Understanding micro-segmentation

1 min read

Understanding micro-segmentation

While HIPAA does not explicitly mention micro-segmentation, it is a security approach aligning with HIPAA’s security requirements by limiting access...

Read More
blue digital lock for post Healthcare data protection strategies

3 min read

Healthcare data protection strategies

Healthcare organizations face the challenge of protecting sensitive patient information. From personal identities to medical histories, this data is...

Read More
medical symbol in blue digital environment for post What is the 405(d) effort?

2 min read

What is the 405(d) effort?

405(d) is a program targeted at tackling the prevalent cybersecurity threat healthcare organizations face nationwide. The program aims to provide...

Read More
digital lock for post Top cybersecurity focus areas revealed at HHS and NIST conference

2 min read

Top cybersecurity focus areas revealed at HHS and NIST conference

The HHS/NIST conference, titled Safeguarding Health Information: Building Assurance through HIPAA Security 2024, took place on October 24, 2024, in...

Read More
Image of lock for blog about Best practices for secure data management

3 min read

Best practices for secure data management

With 328.77 million terabytes of data created daily, it's no surprise that cyber threats are on the rise, as criminals look to exploit this valuable...

Read More
red qr code on keyboard

2 min read

How to create a defense strategy against quishing

Quishing is a cyber threat that exploits QR codes and phishing in deceptive emails, posing risks like data breaches and malware infections. The HC3...

Read More