Deep Blue Background

Cybersecurity Blog

Expert insights, guidance, and recommendations for strengthening your healthcare cybersecurity posture.

  • By Category

  • By Date

  • Reset
Read More
Living Off the Land Attacks: Unveiling the Illusion 

Living Off the Land Attacks: Unveiling the Illusion 

When a threat actor performs a “Living Off the Land” (LOTL) attack, they use legitimate tools and processes within a ...
Read More
Blog Cyber Attacks Types
Read More
The Evolution and Impact of NIST CSF 2.0

The Evolution and Impact of NIST CSF 2.0

NIST, or the U.S. National Institute of Standards and Technology, is at the forefront of the evolving realm of cybersecurity. ...
Read More
Blog Regulation & Compliance
Read More
Healthcare Cybersecurity Threats: July 2023

Healthcare Cybersecurity Threats: July 2023

In July, cybercriminals increasingly targeted Linux systems and exploited new zero-day vulnerabilities in Citrix solutions. While ...
Read More
Blog Healthcare Cybersecurity Threats
Read More
Behind the Scenes of a Hospital Ransomware Attack 

Behind the Scenes of a Hospital Ransomware Attack 

In television dramas and Hollywood movies, ransomware attacks are often made known by a flashy message that pops up on ...
Read More
Blog Cyber Attacks Types
Read More
Healthcare Cybersecurity Threats: June 2023

Healthcare Cybersecurity Threats: June 2023

During the summer months, threat actors often escalate their activities, taking advantage of staffing shortages among IT teams, ...
Read More
Blog Healthcare Cybersecurity Threats
Read More
How Health Systems Can Reduce their Attack Surface with VTM

How Health Systems Can Reduce their Attack Surface with VTM

What is attack surface management? Think of your attack surface as a fortress with multiple entry points. Each entry point ...
Read More
Blog Vulnerability Threat Management
Read More
Single Sign-On vs Multi-Factor Authentication: Do you Know the Difference?

Single Sign-On vs Multi-Factor Authentication: Do you Know ...

A disheartening reality is that cyberattacks targeting healthcare and other critical industries are on the rise, making it more ...
Read More
Blog Cybersecurity Fundamentals
Read More
Take Control of your Healthcare Security with Threat Hunting

Take Control of your Healthcare Security with Threat Hunting

What is threat hunting? Similar to how early detection and prevention are crucial to maintaining patient health, threat hunting ...
Read More
Blog SOC
Read More
Can a Decryption Key Help you Avoid Paying a Ransom?

Can a Decryption Key Help you Avoid Paying a Ransom?

Network security admins all have the same fear – Friday afternoon at about 4:30pm, tech support gets a call that ...
Read More
Blog Network Security