Deep Blue Background

Cybersecurity Blog

Expert insights, guidance, and recommendations for strengthening your healthcare cybersecurity posture.

  • By Category

  • By Date

  • Reset
Read More
Healthcare Cybersecurity Threats: September 2023

Healthcare Cybersecurity Threats: September 2023

Last month, three new cyber vulnerabilities emerged, posing a significant threat to healthcare organizations. Two were ...
Read More
Blog Healthcare Cybersecurity Threats
Read More
Top Cybersecurity Threats Facing Hospitals and How to Reduce your Risk

Top Cybersecurity Threats Facing Hospitals and How to ...

Every single facility that treats patients and gathers patient data is a target for a cyberattack, and this risk is ...
Read More
Blog Healthcare Cybersecurity Threats
Read More
Healthcare Cybersecurity Threats: August 2023

Healthcare Cybersecurity Threats: August 2023

Vulnerabilities from two very different IT manufacturers and device types were notable threats in August. They serve as a ...
Read More
Blog Healthcare Cybersecurity Threats
Read More
Stretching your Cybersecurity Budget: 6 Ways to Do More With Less 

Stretching your Cybersecurity Budget: 6 Ways to Do More ...

In today’s healthcare landscape, “doing more with less” isn’t just a slogan – it’s a growing request, ...
Read More
Blog Cybersecurity Budget
Read More
Black Hat 2023: Reflections from a First-Timer 

Black Hat 2023: Reflections from a First-Timer 

Now that the dust has settled and the hype surrounding Black Hat 2023 has subsided, I wanted to take a ...
Read More
Blog Cybersecurity Conferences
Read More
Living Off the Land Attacks: Unveiling the Illusion 

Living Off the Land Attacks: Unveiling the Illusion 

When a threat actor performs a “Living Off the Land” (LOTL) attack, they use legitimate tools and processes within a ...
Read More
Blog Cyber Attacks Types
Read More
The Evolution and Impact of NIST CSF 2.0

The Evolution and Impact of NIST CSF 2.0

NIST, or the U.S. National Institute of Standards and Technology, is at the forefront of the evolving realm of cybersecurity. ...
Read More
Blog Regulation & Compliance
Read More
Healthcare Cybersecurity Threats: July 2023

Healthcare Cybersecurity Threats: July 2023

In July, cybercriminals increasingly targeted Linux systems and exploited new zero-day vulnerabilities in Citrix solutions. While ...
Read More
Blog Healthcare Cybersecurity Threats
Read More
Behind the Scenes of a Hospital Ransomware Attack 

Behind the Scenes of a Hospital Ransomware Attack 

In television dramas and Hollywood movies, ransomware attacks are often made known by a flashy message that pops up on ...
Read More
Blog Cyber Attacks Types