Deep Blue Background

Cybersecurity Blog

Expert insights, guidance, and recommendations for strengthening your healthcare cybersecurity posture.

  • By Category

  • By Date

  • Reset
Read More
2019 Horizon Report on Connected Medical Device Risks

2019 Horizon Report on Connected Medical Device Risks

We recently released our bi-annual 2019 Horizon Report highlighting industry-wide data and insights to help healthcare ...
Read More
Blog Connected Medical Devices
Read More
Entrusting an MSSP With Healthcare IT Assessment

Entrusting an MSSP With Healthcare IT Assessment

The technology needs of any healthcare organization are constantly changing, forcing administrators to continuously reevaluate ...
Read More
Blog Cyber Talent Management
Read More
Solving the #1 Healthcare IT Security Issue: Turnover

Solving the #1 Healthcare IT Security Issue: Turnover

As the IT Security candidate shortage in the medical industry continues to grow, healthcare administrators find themselves faced ...
Read More
Blog Cyber Talent Management
Read More
New Medical Technology? Take These 4 Security Steps

New Medical Technology? Take These 4 Security Steps

Like most innovation-centric industries, the healthcare vertical is undergoing rampant adoption and acceptance of the Internet of ...
Read More
Blog Connected Medical Devices
Read More
Top 5 Takeaways from HIMSS19

Top 5 Takeaways from HIMSS19

Fortified Health Security’s team of cybersecurity and data loss prevention specialists attend the HIMSS19 Global Conference ...
Read More
Blog Cybersecurity Conferences
Read More
Why Interoperability Makes Pen Testing Even More Important

Why Interoperability Makes Pen Testing Even More Important

Healthcare organizations within every medical specialty continue to expand, making interoperability a top priority for ...
Read More
Blog Cybersecurity Fundamentals
Read More
State of Cybersecurity Talent in 2019

State of Cybersecurity Talent in 2019

Recent reports have confirmed what healthcare directors and HR specialists have already recognized and painfully experienced ...
Read More
Blog Cyber Talent Management
Read More
What’s Different About Securing PHI?

What’s Different About Securing PHI?

Cybersecurity and data loss prevention are critical IT components at any organization. Especially in the case of Protected Health ...
Read More
Blog Regulation & Compliance
Read More
HSCC’S New Framework For Medical Device Security

HSCC’S New Framework For Medical Device Security

While many providers assume that it’s the facility’s internal infrastructure that fosters data breaches, the problem ...
Read More
Blog Regulation & Compliance