Cybersecurity (8)

Image of lcok for blog about The importance of secure healthcare information management

3 min read

The importance of secure healthcare information management

With over 328 million terabytes of data generated daily, cyber threats are rising as criminals seek to exploit this valuable resource. Today, secure...

Read More
computer server red background

1 min read

Rhode Island computer network hit by cyberattack

The attack resulted in the state shutting down its online benefits systems.

Read More
Image of shield for blog about What are robust cybersecurity practices?

2 min read

What are robust cybersecurity practices?

Robust security practices refer to a comprehensive set of actions, tools, and strategies designed to protect systems, networks, and data from...

Read More
Image of code of data for blog about How do cybercriminals use stolen data?

2 min read

How do cybercriminals use stolen data?

Cybercriminals use stolen data for many malicious purposes, like financial gain, extortion, and more.

Read More
hacker at computer with digital code and russian flag

3 min read

Why Russia is often linked to ransomware cases

Russia frequently appears in discussions about cyber attacks, and for good reason. The country’s geopolitical climate, legal policies, and thriving...

Read More
Image of lock for blog about What are strong security practices?

2 min read

What are strong security practices?

Strong security practices and methodologies, such as email authentication, are advisable to protect organizations from cyber threats. These are...

Read More
Image of shield for blog about What are HIPAA audit controls?

2 min read

What are HIPAA audit controls?

HIPAA audit controls refer to the mechanisms and policies covered entities and business associates implement to track and monitor access to...

Read More
Image of locked computer for blog about Access control vs Audit control

2 min read

Access controls vs Audit controls

Access control ensures that only authorized users can interact with systems and data, while audit control provides visibility and accountability...

Read More
blood supply bags with barcode

2 min read

FDA urges blood suppliers to improve cyber defenses

The US Food and Drug Administration (FDA) recently called on blood suppliers to increase their cybersecurity to safeguard the safety and integrity of...

Read More
Image of locks for blog about Managing technological and physical risk

1 min read

Managing technological and physical risks

Technological risks are the vulnerabilities arising from digital infrastructure. Meanwhile, physical risks are threats that could lead to physical...

Read More
Image of data storage for blog about How to secure central storage devices

2 min read

How to secure central storage devices

Organizations must secure any vulnerabilities in central storage devices. Security requirements may depend on the device and the organization, as...

Read More
Image of calculator for blog about What is a cost-benefit analysis?

2 min read

What is a cost-benefit analysis?

Cost-benefit analyses (CBAs) are rooted in economic evaluation, assigning monetary values to both costs and benefits. It can be applied to risk...

Read More
Image of magnifying glass for blog about The uses of control analyses in email policy control

2 min read

The uses of control analyses in email

Control analysis is a way for healthcare organizations to test the technical safeguards required by the HIPAA Security Rule. The test itself extends...

Read More