2 min read
How to handle the threat of lost devices
With the shift towards digital records, healthcare facilities rely on mobile devices to access and store patient data. These devices are prime...
2 min read
With the shift towards digital records, healthcare facilities rely on mobile devices to access and store patient data. These devices are prime...
3 min read
According to a study about the impacts of layoffs on cybersecurity breaches, companies may face an increased risk of cyberattacks after letting...
2 min read
A single breach can lead to significant financial losses, damage to reputation, and legal liabilities. Fortunately, proactive planning and robust...
2 min read
Cybercriminals are now using DocuSign’s Envelopes API to send fake invoices that look legitimate, bypassing usual email security checks.
2 min read
The latest cybersecurity newsletter from the Office for Civil Rights (OCR) has a clear message for healthcare organizations: social engineering...
4 min read
According to IBM, “Threat hunting, also known as cyberthreat hunting, is a proactive approach to identifying previously unknown, or ongoing...
3 min read
With a second term on the horizon, Trump’s cybersecurity policies could shape the future of US defenses against ransomware, business email...
1 min read
While HIPAA does not explicitly mention micro-segmentation, it is a security approach aligning with HIPAA’s security requirements by limiting access...
3 min read
Healthcare organizations face the challenge of protecting sensitive patient information. From personal identities to medical histories, this data is...
2 min read
405(d) is a program targeted at tackling the prevalent cybersecurity threat healthcare organizations face nationwide. The program aims to provide...
2 min read
The HHS/NIST conference, titled Safeguarding Health Information: Building Assurance through HIPAA Security 2024, took place on October 24, 2024, in...
3 min read
With 328.77 million terabytes of data created daily, it's no surprise that cyber threats are on the rise, as criminals look to exploit this valuable...
2 min read
Quishing is a cyber threat that exploits QR codes and phishing in deceptive emails, posing risks like data breaches and malware infections. The HC3...