Is Electronic Protected Health Information (ePHI) Getting Outside Your Healthcare Organization?

Under HIPAA regulations, health information or data that can be used to identify an individual patient is categorized as protected health information (PHI) and must undergo a wide range of practices explicitly designed to protect patient confidentiality. Covered entities must implement processes and controls to ensure confidentiality, integrity, and availability...

5 Reasons to Conduct Yearly Penetration Testing

When protecting your network from external threats, you sometimes need to think like a hacker. You can better prevent cyber attacks by understanding how perpetrators could potentially access sensitive data. Therefore, penetration testing should be a part of your yearly cybersecurity plan.  What Is Penetration Testing? Penetration testing is one...