Blog

Stay up-to-date on the latest cyber threats

By Category
By Date

08/28/2025

By: Fortified Health Security

Many healthcare IT/cyber teams are small and resource-constrained – often on the brink of burnout. They don’t have the headcount ...

risk assessment visual

08/20/2025

By: Fortified Health Security

Knowing where to begin. That’s the biggest challenge most healthcare leaders face when it comes to maturing their cybersecurity programs. ...

08/07/2025

By: Russell Teague

How federal staffing cuts, government restructuring, and Medicaid policy shifts threaten the cybersecurity posture of our healthcare system. In a ...

social engineering hacker with phishing message on iphone

08/06/2025

By: Fortified Health Security

This article was developed by Fortified Health Security experts, Don Kelly, Troy Cruzen, and Bob Thurner, drawing from their real-world ...

Iredell Health image

07/28/2025

By: Fortified Health Security

When a bank or large retailer experiences a cyberattack, there can be financial repercussions, but no one’s health is in ...

07/25/2025

By: Fortified Health Security

There are essentially three threat paths that bad actors take to access an Active Directory in order to compromise and ...