Why Unstructured Data Is a Hidden Risk

unstructured data image

When most people think about sensitive data, they picture electronic health records (EHRs), financial databases, or other structured systems. Those are important, but they’re not the whole story. The bigger risk for many organizations — especially in healthcare — sits in unstructured data. Think files, folders, spreadsheets, shared drives, emails, SharePoint, Teams, and cloud storage. […]

Proven Ways to Strengthen Active Directory Security

There are essentially three threat paths that bad actors take to access an Active Directory in order to compromise and control a hospital system: social engineering, third-party compromise, and system vulnerability compromise. In our new webinar, Intermountain Health’s cybersecurity director, Shawn Anderson, explores proven ways to strengthen Active Directory security by thwarting intruders’ attempts to […]

Internet of Medical Things (IoMT)Security: Why Healthcare Must Act Now

The Internet of Medical Things (IoMT) has transformed patient care by delivering real-time data and improving clinical outcomes. However, as Fortified Health Security predicted in its 2025 Horizon Report, interconnected medical devices create new cybersecurity risks. The recent FDA and CISA alerts about vulnerabilities in Contec patient monitors highlight the urgent need for proactive IoMT […]

The Risk and Rewards of Quantum Computing in Healthcare

Healthcare organizations depend on strong cryptographic technologies to secure data. As quantum technologies rapidly advance, concerns are growing about the threats quantum computing poses to widely used encryption methods. If you’re concerned about—or even unaware of— the issues surrounding quantum computing, this post will explore the potential threats to your healthcare organization and the strategies […]

Navigating Generative AI and Healthcare Cybersecurity

Artificial intelligence (AI) refers to computer systems capable of performing tasks that historically required human intelligence. Generative AI, conversely, can be understood as the “actionable” aspect of AI, where new data can be created to understand and generate human responses rather than using Large Language Models (LLM) to analyze existing data. Think of generative AI […]

Can a Decryption Key Help you Avoid Paying a Ransom?

Network security admins all have the same fear – Friday afternoon at about 4:30pm, tech support gets a call that a computer is acting strange with files and folders not working properly. Their response to the call reveals a ransom note! But before you consider paying a ransom for a security breach, consider using a […]

5 Healthcare Cybersecurity Tips for Apps and Mobile Devices

Every healthcare organization, regardless of the devices used, faces the risk of cybersecurity attacks. However, the use of mobile devices and apps can bring the risk of a cyber attack to another level. Apps and mobile devices are highly effective, affordable, and convenient ways for medical facilities to manage a diverse range of components throughout […]

9 Tricks Spammers Use to Compromise Your System

Today’s cybersecurity tools can help stop cybercriminals; however, many spammers find creative ways to get around safeguards. Spammers add another layer of risk to healthcare organizations, so it’s important that all employees know how to spot these cybersecurity threats. Here are some of the most common tricks spammers may use to access and compromise systems.  […]

How Healthcare Organizations Should Strengthen Their Cybersecurity Framework

A strong cybersecurity framework guards against the most prominent cyber threats in healthcare.  This framework should also be scalable to meet new threats.  By staying aware of the latest cyber attacks in healthcare and prepping your security team, your organization can keep a step ahead of today’s cyber criminals. Here is what every healthcare organization […]

How to Maintain Cybersecurity When Employees Work Remotely

With the spread of Covid-19 around the country, many organizations are sending employees home to work remotely. Doing so can be an essential health and safety precaution, however, remote work comes with additional cybersecurity threats. Here are some ways that organizations can prioritize network security while employees are dispersed. Implement Network Access Control (NAC) When […]