Blog

Read More
How to Protect your Healthcare Organization Against Social Engineering

How to Protect your Healthcare Organization Against Social Engineering

Social engineering tactics, such as phishing, have become the go-to starting point for threat actors, especially against healthcare organizations. The …

Learn More
Blog Cybersecurity Fundamentals
Read More
Is “Sorry” Good Enough? Insights from UHG’s Change Healthcare Testimony

Is “Sorry” Good Enough? Insights from UHG’s Change Healthcare Testimony

On Wednesday, May 1, Andrew Witty, CEO of United Health Group (UHG), appeared before two congressional committees to discuss the …

Learn More
Blog Regulation & Compliance
Read More
Navigating Generative AI and Healthcare Cybersecurity

Navigating Generative AI and Healthcare Cybersecurity

Artificial intelligence (AI) refers to computer systems capable of performing tasks that historically required human intelligence. Generative AI, conversely, can …

Learn More
Blog Network Security
Read More
Congressional Scrutiny of Healthcare Cyber Risks

Congressional Scrutiny of Healthcare Cyber Risks

On April 16th, healthcare industry leaders gathered in Washington, DC to testify to the Energy and Commerce Health Subcommittee on …

Learn More
Regulation & Compliance Blog
Read More
Choosing the Right MSSP

Choosing the Right MSSP

The “evolving threat landscape” is more than just a ubiquitous cybersecurity term; it represents some of the biggest challenges cybersecurity …

Learn More
Blog Cyber Talent Management
Read More
Charting a Wellness Plan for Healthcare Cybersecurity

Charting a Wellness Plan for Healthcare Cybersecurity

The journey to cybersecurity resilience in healthcare is not a solo endeavor. It requires coordination among several pivotal organizations. At …

Learn More
Blog Regulation & Compliance
Read More
Healthcare Cybersecurity Threats: March 2024

Healthcare Cybersecurity Threats: March 2024

Even though spring has officially sprung, recent Ivanti and Fortinet vulnerabilities have made it feel a bit like Groundhog Day. …

Learn More
Blog Healthcare Cybersecurity Threats
Read More
Hidden Signs of a Healthcare Data Breach

Hidden Signs of a Healthcare Data Breach

Healthcare data breaches can be costly, difficult to resolve, and dangerous for patients. Yet despite the best preventative practices, breaches …

Learn More
Blog Data Breaches
Read More
13 Things to Know About the New FDA Medical Device Cybersecurity Requirements

13 Things to Know About the New FDA Medical Device Cybersecurity Requirements

Recent changes have gone into effect that give the Food and Drug Administration (FDA) a stately feather in their cap: …

Learn More
Blog Connected Medical Devices
Read More
How Cyber Attacks Impact Patient Trust

How Cyber Attacks Impact Patient Trust

When a patient chooses a healthcare organization, they aren’t just trusting them with their physical health; they’re also trusting that …

Learn More
Blog Healthcare Cybersecurity Threats