Associate Spotlight: Troy Cruzen

  How long have you been with Fortified and what is your current role? I’ve been with Fortified for almost two years. I’ve been in my current vCISO role as of March 2024, and prior to that I was a security analyst here at Fortified supporting clients in a variety of capacities.   What were […]

How to Get C-Suite Buy-In for Healthcare Cybersecurity

Giving a cybersecurity presentation to the C-suite can be a challenge for even the most experienced Chief Information Security Officer (CISO). You’re often not talking to technical people, for one thing. You might look up from your carefully crafted slides about Zero Trust or third-party risk management and see glazed eyes. Every executive at the […]

The Risk and Rewards of Quantum Computing in Healthcare

Healthcare organizations depend on strong cryptographic technologies to secure data. As quantum technologies rapidly advance, concerns are growing about the threats quantum computing poses to widely used encryption methods. If you’re concerned about—or even unaware of— the issues surrounding quantum computing, this post will explore the potential threats to your healthcare organization and the strategies […]

Healthcare Cybersecurity Threats: June 2024

June was a high-stakes game on the cybersecurity chessboard for healthcare organizations. Major technology providers like Progress MOVEit and SolarWinds found themselves in check due to critical software vulnerabilities. Meanwhile, threat groups like Black Basta made bold moves, and new phishing schemes targeting Cisco Webex users emerged as unexpected gambits. Read on to discover more […]

Associate Spotlight: Hannah Hays

  How long have you been with Fortified and what is your current role?   I’ve been with Fortified for 2 ½ years in my current role as Senior Client Success Manager.   What were you doing before you joined Fortified? Before joining Fortified I was a Project Manager at another cybersecurity company where I oversaw […]

How Mature is your Healthcare SOC?

To combat increasingly sophisticated cybersecurity threats, healthcare entities must transition their Security Operations Center (SOC) from a reactive resource to a proactive and predictive force. But a SOC, especially in healthcare, doesn’t reach optimum levels overnight. In this post, we explore the evolutionary stages of SOC maturity, offering key insights on how healthcare organizations can […]

How a Continuous SOC Protects Healthcare Data

The rise in cyber threats coupled with the complexity of healthcare IT infrastructure calls for a proactive approach to cybersecurity in healthcare. Many organizations are turning to Managed Security Services Providers (MSSPs) to establish and maintain a continuous Healthcare Security Operations Center (SOC). Let’s delve into why and how an MSSP-driven cybersecurity SOC is vital […]

Breaking Silos: How SOC and Compliance Teams Can Transform Healthcare Security

Security Operations Centers (SOCs) and Compliance teams may seem like natural allies in healthcare cybersecurity. Both are tasked with limiting risk, protecting an organization from cyber threats, and staying on the right side of regulatory standards. Despite their similar goals, however, SOCs and Compliance teams don’t always have strong partnerships. This presents a missed opportunity […]

Healthcare Cybersecurity Threats: May 2024

Out of the reported healthcare cyber incidents in May, the attack on Ascension stopped many in their tracks. This incident came at a time when many in the industry are still reeling from the Change Healthcare attack, which profoundly affected the healthcare sector, with 94% of hospitals reporting financial repercussions and 74% noting direct impacts […]

How to Protect your Healthcare Organization Against Social Engineering

Social engineering tactics, such as phishing, have become the go-to starting point for threat actors, especially against healthcare organizations. The success cybercriminals have with these attack methods means that it’s unlikely they’ll slow down any time soon. This is why it’s vital to arm your team and healthcare organization with knowledge about what social engineering […]