What does Living Off the Land (LOTL) mean in cybersecurity?When a threat actor performs a “Living Off the Land” (LOTL) attack, they use legitimate tools and processes within a system to carry out nefarious activities. Unlike traditional malware, LOTL tactics don't rely on external malicious code; instead, they exploit what's...
Author: TJ Ramsey
How health systems can reduce their attack surface with VTM
What is attack surface management?Think of your attack surface as a fortress with multiple entry points. Each entry point represents a system or network weakness that could potentially be breached by an intruder.These weaknesses, like outdated patches, misconfigurations, and traditional vulnerabilities, serve as open doors or unguarded walls that can...
Three tips for hospitals to combat cybersecurity threats
Fortified Health Security featured in Chief Healthcare Executive.
Can a decryption key help you avoid a ransom?
Network security admins all have the same fear - Friday afternoon at about 4:30pm, tech support gets a call that a computer is acting strange with files and folders not working properly. Their response to the call reveals a ransom note! But before you consider paying a ransom for a...
3 Ways to Reduce Vulnerabilities In Your Healthcare Security
The goal of a cybersecurity in healthcare isn’t to deploy more tools or gather data. It’s to protect patients and their personal health information (PHI). While cybersecurity teams have an array of options available to combat cyberattacks, the abundance of choices can make it overwhelming to determine the most suitable...
How to Level Up Your Cybersecurity Program
Penetration testing, or pentesting as it’s often called, is one of the fundamental building blocks for a cybersecurity program. Pentesting provides vital information about an organization’s cybersecurity posture and seeks to uncover previously undiscovered vulnerabilities. It also demonstrates the impact of previously known vulnerabilities for more accurate risk assessment. Unfortunately,...
6 components of a vulnerability threat management program
Safeguarding your healthcare organization's electronic Protected Health Information (ePHI) against cybersecurity threats is like protecting your financial assets from potential fraudsters. Just as neglecting to invest in robust security measures could leave your finances vulnerable to theft, overlooking or minimizing the importance of threat management could expose your health system's...
Hidden signs of a healthcare data breach (and how to detect them)
When it comes to cybersecurity best practices, timely detection is key. This is especially important for healthcare organizations. Hospitals, clinics, and administrative offices handle private patient data every day, and this data in the wrong hands can have significant consequences. But how can you tell when your network has been...
How healthcare organizations should strengthen their cybersecurity framework against cyber attacks
A strong cybersecurity framework guards against the most prominent cyber threats in healthcare, but this framework should also be scalable to meet new threats. In the first quarter of 2021, the healthcare industry has faced several new types of attacks, and organizations need to step up their security practices to...
5 reasons to conduct yearly penetration testing
When protecting your network from external threats, you sometimes need to think like a hacker. You can better prevent cyber attacks by understanding how perpetrators could potentially access sensitive data. Therefore, penetration testing should be a part of your yearly cybersecurity plan. What is penetration testing? Penetration testing is one...