Securing the Home Office: How Healthcare Is Adapting to Remote Work, During and After COVID-19

Fortified's CEO, Dan L. Dodson, recently spoke with Health IT Answers about cyber-attack trends and how they impact healthcare organizations. Dodson also shares insights into risks associated with remote workers. Topics of discussion:1) Email cyber-attack trends in 20202) Questions organizations should be asking about their cybersecurity programs3) What impacts COVID-19...

The Risk of Nation-State Hackers, Government-Controlled Health Data

The COVID-19 pandemic has driven a rise in targeted, sophisticated cyberattacks designed to take advantage of an increasingly connected environment. In healthcare, it’s led to a rise in nation-state attacks, in an effort to steal valuable COVID-19 data and disrupt care operations.  Read the full article here.

Health IT Security – COVID-19 Impact on Ransomware, Threats, Healthcare Cybersecurity

COVID-19 has significantly shifted the threat landscape from attacks on individuals and small businesses to critical infrastructure, governments, and major corporations, according to Interpol. Malicious cyberattacks were behind the majority of healthcare IT security incidents, while ransomware demands soared as “big game” variants dominated the threat landscape.  Read the full article here.

Can We Overcome Human Error in Cybersecurity?

Healthcare is taking steps to address the human elements in cybersecurity, including beefed up security awareness training for all employees. But the unique conditions of a healthcare workplace make it difficult to achieve alignment on security policy. Here are a few guidelines to help reduce exposure and mitigate the impact...

WEBINAR: Beyond WannaCry – Vital Steps for Ransomware Preparedness

Since the global WannaCry cyberattack made the word “ransomware” top of mind for millions of people recently, the Fortified team has had informative and actionable conversations with many healthcare leaders. Our proper tendency is to respond to an attack. However, the foundational efforts to establish a truly secure cybersecurity posture...