Blog

Read More
2018 HIMSS Takeaways

2018 HIMSS Takeaways

Customer Experience, Protecting IoT and Connected Medical Devices, and Clinical Engineering + HIT are top areas of discussion at recent HIMSS conference.

Learn More
Blog Cybersecurity Conferences
Read More
Can We Overcome Human Error in Cybersecurity?

Can We Overcome Human Error in Cybersecurity?

Healthcare is taking steps to address the human elements in cybersecurity, including beefed up security awareness training for all employees. But the unique conditions of a healthcare workplace make it difficult to achieve alignment on security policy. Here are a few guidelines to help reduce exposure and mitigate the impact of human error.

Learn More
Blog Cybersecurity Fundamentals
Read More
Cybersecurity Resolutions: Focus on the Fundamentals

Cybersecurity Resolutions: Focus on the Fundamentals

Perhaps your organization has made a resolution to focus on cybersecurity in 2018. Many healthcare organizations made progress in 2017 and some have yet to start their journey. Regardless, the only way to keep things moving forward is to start. In cybersecurity, the first step is to conduct a regular risk assessment.

Learn More
Blog Cybersecurity Fundamentals
Read More
Why National Cybersecurity Awareness Month Matters

Why National Cybersecurity Awareness Month Matters

National Cyber Security Awareness Month reminds us that hospitals and health systems are custodians of precious patient information, and they have a clinical, ethical and legal obligation to keep data safe and secure. Amidst the daily blocking and tackling of cyber security, the annual event reinforces our commitment to helping clients preserve their custodial obligation.

Learn More
Cybersecurity Fundamentals Blog
Read More
How Healthcare Organizations Can Stand Out to CISOs

How Healthcare Organizations Can Stand Out to CISOs

Health systems must realize that they are competing for CISO talent against large corporations and fast-paced technology companies that have already made solid commitments to security.

Learn More
Blog Cyber Talent Management