Fortified Health Security’s Senior VISO Testifies Before the U.S. Senate’s Homeland Security & Governmental Affairs Committee

Kate Pierce, Fortified Health Security’s Senior Virtual Information Security Officer & Executive Director of Subsidy testified before the U.S. Senate’s Homeland Security & Governmental Affairs Committee on Thursday, March 16. The hearing focused on the topic “In Need of a Checkup: Examining the Cybersecurity Risks to the Healthcare Sector.” Having...

5 Healthcare cybersecurity tips for apps and mobile devices

Every healthcare organization, regardless of the devices used, faces the risk of cybersecurity attacks. However, the use of mobile devices and apps can bring the risk of a cyber-attack to another level. Apps and mobile devices are highly effective, affordable, and convenient ways for medical facilities to manage a diverse...

5 Steps to Improve Cybersecurity on Your Connected Medical Devices 

Patient care depends on reliable access to medical devices, so hospital staff need to keep an accurate inventory of this equipment. However, since more devices are connected to hospital networks than ever before, there is an increased risk of cyberattacks. This guide will break down some of the ways that...

9 Tricks Spammers Use to Compromise Your System

Today's cybersecurity tools can help stop cybercriminals; however, many spammers find creative ways to get around safeguards. Spammers add another layer of risk to healthcare organizations, so it's important that all employees know how to spot these cybersecurity threats. Here are some of the most common tricks spammers may use...

Should You Build or Buy SOC Operations? Partnering with an MSSP For Network Security

Every organization has unique cyber security risks. You can protect your data from external threats by assessing these risks and creating a security plan. Generally, this process involves either building an internal Security Operations Center (SOC) or partnering with a Managed Security Services Provider (MSSP). What Factors Are Involved with...

How to Educate Multiple Generations on Security Risks and Protocols

Healthcare employees are the backbone of daily operations. When interacting with patients and handling ePHI, your employees can make or break your cybersecurity strategy. This is why cybersecurity awareness training and education should be on your priority list. But security awareness training isn’t necessarily a one-size-fits-all approach. Currently four main...

2022 Horizon Report

2022 Horizon ReportThe State of Cybersecurity in Healthcare What we cover in the latest report 2021 data breach and industry trends for healthcare year in review Market dynamics including Cyber InsuranceGovernment Regulatory Changes Disruptions to Patient Care Identity and Access A look back on Fortified's 2021 predictions Download

News Headlines Suggest Heightened Cybersecurity Awareness, IT Practitioners Know the Reality

Nation-State Attacks Have Been a Daily Threat for Years, Preparation is King The headlines in the news continue to focus on the Russian invasion of Ukraine. As a result, organizations worldwide have reverberated with the increased probability of a cyber war being launched against critical infrastructure originating from Russian state-sponsored...

Patient Care and Confidence Affected by Cyber Attacks on Healthcare

The Healthcare Clients and Consumers Grade Cybersecurity Software and Services, Black Book™ Industry 2022 Survey, has been released. After surveying almost 3,000 security and IT professionals, Black Book Research shared its findings. In the same survey, Black Book Research named Fortified Health Security, Top-Ranked Cybersecurity Vendor for Outsourcing & Security...

Fortified Roundtable | December 15th | 2 PM CT

Our roundtables are an opportunity for you to meet with your peers and discuss challenges, ideas, and solutions. Click here and reserve your spot in our December 2022 Roundtable today. Our roundtables are an opportunity for you to meet with your peers and discuss challenges, ideas, and solutions. Coming together...

Webinar | Why Healthcare Vulnerability Threat Management is Evolving | Tuesday, November 29th | 2 PM CT

Vulnerabilities Threat Management (VTM) is crucial to building a stronger cybersecurity posture. Pressure on healthcare organizations has increased to add more technology for patient care while protecting their systems. Unfortunately, more technology, whether software or devices, elevates the risk from threat actors. Traditionally VTM focused primarily on IT system vulnerabilities,...

Fortified Roundtable | November 17th | 2 PM CT

Our roundtables are an opportunity for you to meet with your peers and discuss challenges, ideas, and solutions. Click here and reserve your spot in our November 2022 Roundtable today. Our roundtables are an opportunity for you to meet with your peers and discuss challenges, ideas, and solutions. Coming together...

Fortified Roundtable | October 13th | 2 PM CT

Our roundtables are an opportunity for you to meet with your peers and discuss challenges, ideas, and solutions. Click here and reserve your spot in our October 2022 Roundtable today. Our roundtables are an opportunity for you to meet with your peers and discuss challenges, ideas, and solutions. Coming together...