Blog

Stay up-to-date on the latest cyber threats

By Category
By Date

10/26/2022

By: Fortified Health Security

Patient care depends on reliable access to medical devices, so hospital staff need to keep an accurate inventory of this ...

10/25/2022

By: Fortified Health Security

Yawn. I’ve been here for six hours and all I’ve seen so far is someone who cut their finger slicing ...

10/25/2022

By: Fortified Health Security

Today’s cybersecurity tools can help stop cybercriminals; however, many spammers find creative ways to get around safeguards. Spammers add another ...

10/21/2022

By: Fortified Health Security

Every organization has unique cyber security risks. You can protect your data from external threats by assessing these risks and ...

10/20/2022

By: T.J. Ramsey

Penetration testing, or pen testing as it’s often called, is one of the fundamental building blocks for a cybersecurity program. ...

10/19/2022

By: Melissa Adams

Third-Party Risk Management, or TPRM, is a growing concern for healthcare organizations. According to the 2022 Ponemon Industry Report, 63% ...