Deep Blue Background

Cybersecurity Blog

Expert insights, guidance, and recommendations for strengthening your healthcare cybersecurity posture.

  • By Category

  • By Date

  • Reset
Read More
How Proposed 2021 HIPAA Changes Will Affect Your Healthcare IT

How Proposed 2021 HIPAA Changes Will Affect Your Healthcare ...

On January 21, 2021, an important development in cybersecurity news was released. The United States Department of Health and ...
Read More
Blog Regulation & Compliance
Read More
Data Breach Lawsuits on the Rise: Is Your Healthcare Organization Prepared?

Data Breach Lawsuits on the Rise: Is Your Healthcare ...

  In addition to the rise in cyber attacks against hospitals and health systems, another alarming trend is the rise ...
Read More
Blog Data Breaches
Read More
Recommendations on NIST Resource Guide

Recommendations on NIST Resource Guide

Fortified recently responded to an opportunity from NIST to comment on the utility of NIST Special Publication (SP) 800-66, ...

Read More
Blog Regulation & Compliance
Read More
How Cyber Insurance Applies to Cybersecurity Posture

How Cyber Insurance Applies to Cybersecurity Posture

  As organizations face increasing cyber attacks, now is the time to consider increasing protections via cyber insurance. ...
Read More
Blog Incident Response
Read More
Threat Hunting in Healthcare: What It Is & Why It Matters

Threat Hunting in Healthcare: What It Is & Why It ...

Incident response is a vital part of a strong cybersecurity program. However, responding to cybersecurity threats and attacks is ...
Read More
SOC Blog
Read More
SIEM and EDR, and Why You Need Both

SIEM and EDR, and Why You Need Both

  When facing increased cyber threats, it’s vital for healthcare organizations to deploy strategies that incorporate a ...
Read More
Blog SOC
Read More
How Healthcare Organizations Should Strengthen Their Cybersecurity Framework

How Healthcare Organizations Should Strengthen Their ...

A strong cybersecurity framework guards against the most prominent cyber threats in healthcare.  This framework should also be ...
Read More
Blog Network Security
Read More
Is Electronic Protected Health Information (ePHI) Getting Outside Your Healthcare Organization?

Is Electronic Protected Health Information (ePHI) Getting ...

Under HIPAA regulations, health information or data that can be used to identify an individual patient is categorized as ...
Read More
Blog Regulation & Compliance
Read More
5 Reasons to Conduct Yearly Penetration Testing

5 Reasons to Conduct Yearly Penetration Testing

When protecting your network from external threats, you sometimes need to think like a hacker. You can better prevent cyber ...
Read More
Blog Cybersecurity Fundamentals