The goal of a cybersecurity in healthcare isn’t to deploy more tools or gather data. It’s to protect patients and their personal health information (PHI). While cybersecurity teams have an array of options available to combat cyberattacks, the abundance of choices can make it overwhelming to determine the most suitable...
Month: October 2022
Healthcare’s email security problem is a compliance and forensics nightmare
Fortified Health Security's Dan L. Dodson featured in SC Media.
5 Steps to Improve Cybersecurity on Your Connected Medical Devices
Patient care depends on reliable access to medical devices, so hospital staff need to keep an accurate inventory of this equipment. However, since more devices are connected to hospital networks than ever before, there is an increased risk of cyberattacks. This guide will break down some of the ways that...
How the Best Organizations Manage Security Awareness Training Programs
Yawn. I’ve been here for six hours and all I’ve seen so far is someone who cut their finger slicing potatoes and someone who burned themselves trying to fry a turkey. What a lame Thanksgiving. I thought my first time working a holiday at a prestigious hospital would be more...
9 Tricks Spammers Use to Compromise Your System
Today's cybersecurity tools can help stop cybercriminals; however, many spammers find creative ways to get around safeguards. Spammers add another layer of risk to healthcare organizations, so it's important that all employees know how to spot these cybersecurity threats. Here are some of the most common tricks spammers may use...
Should You Build or Buy SOC Operations? Partnering with an MSSP
Every organization has unique cyber security risks. You can protect your data from external threats by assessing these risks and creating a security plan. Generally, this process involves either building an internal Security Operations Center (SOC) or partnering with a Managed Security Services Provider (MSSP). What Factors Are Involved with...
How to Level Up Your Cybersecurity Program
Penetration testing, or pentesting as it’s often called, is one of the fundamental building blocks for a cybersecurity program. Pentesting provides vital information about an organization’s cybersecurity posture and seeks to uncover previously undiscovered vulnerabilities. It also demonstrates the impact of previously known vulnerabilities for more accurate risk assessment. Unfortunately,...
Cybersecurity Awareness Throughout the Technical Supply Chain
Fortified Health Security featured in Health IT Answers.
The Next Big Challenge in Healthcare Is Here. Are You Prepared?
Third-Party Risk Management, or TPRM, is a growing concern for healthcare organizations. According to the 2022 Ponemon Industry Report, 63% of respondents stated that while cybersecurity incidents involving third parties are increasing, they feel ineffective at controlling third-party risk. Additionally, 55% of healthcare organizations had experienced a data breach in...
Are You Introducing Risk to Your Organization? Here’s How to Find Out.
The last few years have thrown many curveballs, like Covid, cyberinsurance changes, and a record number of attacks, at healthcare IT and Security teams. During these trying times, many teams were understaffed and resource-constrained, trying to put out daily “fires” and helping maintain efficient patient care. As a result, some...
How to Educate Multiple Generations on Security Risks and Protocols
Healthcare employees are the backbone of daily operations. When interacting with patients and handling ePHI, your employees can make or break your cybersecurity strategy. This is why cybersecurity awareness training and education should be on your priority list. But security awareness training isn’t necessarily a one-size-fits-all approach. Currently four main...
Cybersecurity Awareness and Enabling Multi-Factor Authentication
Fortified Health Security featured in Health IT Answers.
Understanding SIEM, MDR, and XDR in healthcare
New cybersecurity innovations continue to fill the market each year as organizations attempt to stay ahead of threat actors. Sifting through all the options to find the solutions that best fit your healthcare organization’s needs can be a confusing and time-consuming challenge. Compounding the issue are the increasing pressures from...
How expertise on-demand solutions can help close cybersecurity staffing gaps
Strategies for addressing healthcare IT cybersecurity organizational resourcing Finding IT professionals to fill open positions is reaching critical levels for many organizations. In fact, 63% of respondents to an ISACA report shared they had unfilled cybersecurity positions. Almost the same percentage--62%--stated their team was understaffed, taking more than six months...
Experts Continue to Warn About Recognizing and Reporting Phishing
Fortified Health Security featured in Health IT Answers.
How to protect your data online
October is National Cybersecurity Awareness Month (NCSAM), when government and the private sector work together to develop ways that businesses can help their workers and customers keep their digital data safe. It’s an excellent time for healthcare stakeholders to look at the privacy and security best practices they should employ....