Deep Blue Background

Cybersecurity Blog

Expert insights, guidance, and recommendations for strengthening your healthcare cybersecurity posture.

  • By Category

  • By Date

  • Reset
Read More
Is Electronic Protected Health Information (ePHI) Getting Outside Your Healthcare Organization?

Is Electronic Protected Health Information (ePHI) Getting ...

Under HIPAA regulations, health information or data that can be used to identify an individual patient is categorized as ...
Read More
Blog Regulation & Compliance
Read More
5 Reasons to Conduct Yearly Penetration Testing

5 Reasons to Conduct Yearly Penetration Testing

When protecting your network from external threats, you sometimes need to think like a hacker. You can better prevent cyber ...
Read More
Blog Cybersecurity Fundamentals
Read More
How to Maintain Cybersecurity When Employees Work Remotely

How to Maintain Cybersecurity When Employees Work Remotely

With the spread of Covid-19 around the country, many organizations are sending employees home to work remotely. Doing so can ...
Read More
Blog Network Security
Read More
Benefits of Continuous HIPAA Analysis

Benefits of Continuous HIPAA Analysis

The HIPAA Security Rule Administrative Safeguards includes requirements that covered entities “implement policies and ...
Read More
Blog Regulation & Compliance
Read More
Five Major Cybersecurity Threats to Your System

Five Major Cybersecurity Threats to Your System

The barrage of cyber attacks against healthcare organizations, including network security compromise and data breaches, force IT ...
Read More
Blog Network Security
Read More
Intro to Healthcare SIEM

Intro to Healthcare SIEM

Healthcare cybersecurity environments continue to become more complex as they embrace and rely on a diverse range of technologies ...
Read More
SOC Blog
Read More
Designating Number of Connected Medical Devices

Designating Number of Connected Medical Devices

Connected medical devices are being used in various capacities to resolve several issues currently plaguing the healthcare ...
Read More
Blog Connected Medical Devices
Read More
How to Recover From a Healthcare Data Breach

How to Recover From a Healthcare Data Breach

Despite the healthcare industry’s continuous efforts to minimize cybercriminal activity, cyber attacks continue to make ...
Read More
Network Security Blog
Read More
How to Revolutionize Cybersecurity in Your Organization

How to Revolutionize Cybersecurity in Your Organization

Despite continuously integrating innovative cybersecurity upgrades and enhancements, the healthcare industry remains a primary ...
Read More
Blog Cyber Talent Management