Deep Blue Background

Cybersecurity Blog

Expert insights, guidance, and recommendations for strengthening your healthcare cybersecurity posture.

  • By Category

  • By Date

  • Reset
Read More
Healthcare Cybersecurity Threats: June 2023

Healthcare Cybersecurity Threats: June 2023

During the summer months, threat actors often escalate their activities, taking advantage of staffing shortages among IT teams, ...
Read More
Blog Healthcare Cybersecurity Threats
Read More
How Health Systems Can Reduce their Attack Surface with VTM

How Health Systems Can Reduce their Attack Surface with VTM

What is attack surface management? Think of your attack surface as a fortress with multiple entry points. Each entry point ...
Read More
Blog Vulnerability Threat Management
Read More
Single Sign-On vs Multi-Factor Authentication: Do you Know the Difference?

Single Sign-On vs Multi-Factor Authentication: Do you Know ...

A disheartening reality is that cyberattacks targeting healthcare and other critical industries are on the rise, making it more ...
Read More
Blog Cybersecurity Fundamentals
Read More
Take Control of your Healthcare Security with Threat Hunting

Take Control of your Healthcare Security with Threat Hunting

What is threat hunting? Similar to how early detection and prevention are crucial to maintaining patient health, threat hunting ...
Read More
SOC Blog
Read More
Can a Decryption Key Help you Avoid Paying a Ransom?

Can a Decryption Key Help you Avoid Paying a Ransom?

Network security admins all have the same fear – Friday afternoon at about 4:30pm, tech support gets a call that ...
Read More
Network Security Blog
Read More
5 Healthcare Cybersecurity Tips for Apps and Mobile Devices

5 Healthcare Cybersecurity Tips for Apps and Mobile Devices

Every healthcare organization, regardless of the devices used, faces the risk of cybersecurity attacks. However, the use of ...
Read More
Blog Network Security
Read More
Protect Yourself and Your Organization from Holiday Scams

Protect Yourself and Your Organization from Holiday Scams

The holiday season is something many of us look forward to each year. Unfortunately, it’s a “most wonderful time of ...
Read More
Cyber Attacks Types Blog
Read More
3 Things to Add to your Healthcare Vulnerability Threat Management

3 Things to Add to your Healthcare Vulnerability Threat ...

The goal of a cybersecurity in healthcare isn’t to deploy more tools or gather data. It’s to protect patients and ...
Read More
Blog Vulnerability Threat Management
Read More
5 Steps to Improve Cybersecurity on Connected Medical Devices 

5 Steps to Improve Cybersecurity on Connected Medical ...

Patient care depends on reliable access to medical devices, so hospital staff need to keep an accurate inventory of this ...
Read More
Blog Connected Medical Devices