Porous network perimeters in health tech are easy attack surfaces within the healthcare industry. Ponemon Institute discovered an alarming “67% of healthcare organizations have experienced...
Healthcare organizations are a top target for cybercriminals but are twice as likely to suffer a data breach due to internal human error. Despite security threats, medical facilities must continue to...
Patience among patients has been worn thin. In 2021 alone, the healthcare industry suffered 78 data breaches, resulting in 7 million records being exposed. The impact of lost and stolen data is...
What is an insider threat? The Cybersecurity & Infrastructure Security Agency (CISA) defines an insider threat as “the potential for someone with authorized access and knowledge of an organization’s...
Economic volatility and the sophistication of targeted cyberattacks are thorns in the side of any thoughtfully designed business strategy. Covid contingencies have added even more complexity to...
While the Cyber Incident Notification Act of 2021 and the Cyber Incident Reporting Act of 2021 (amendments to the Homeland Security Act of 2002) haven’t passed the Senate, the concept of requiring...
What is your IT plan of attack for 2022? Because if the pandemic has taught us anything, it is that traditional, location-based IT and limited access to workflows and data are things of the past....
Cloud Computing is the best way to achieve digital agility across your enterprise. Moving your data, infrastructure, and applications from on-premise hardware to the cloud supports the productivity...
Alert fatigue is real, and your Security Operations Center (SOC) analysts are probably burning out right now. All the noise, the chaos, and the heroic firefighting efforts from one shift often spill...
Are you probing your cybersecurity program as a hacker does?
If you aren't looking through a hacker's lens, or you're just checking boxes on a compliance form that asks if you have cybersecurity in...