Don’t become the next Catch of the Day! Healthcare providers are worse than their peers at identifying phishing emails and preventing these attacks. What is phishing? How can you protect yourself? Read this article to find out.Read More
HIT Threat Intelligence
HIT Threat Intelligence includes details regarding IT threats such as recently discovered vulnerabilities, current exploits, statistics and analysis regarding security issues and similar actionable information.
A recent report on healthcare cybersecurity shows the industry 15th out of the 18 major US industries surveyed. In Part II of this two-part article, we investigate why healthcare organizations struggle to keep up with cybersecurity threats.Read More
A recent report on healthcare cybersecurity shows the industry 15th out of the 18 major US industries surveyed. In Part I of this two-part article, we explore this poor rating and investigate why healthcare records are so appealing to criminals.Read More
In Part IV of our series on the Meltdown and Spectre vulnerabilities, we finish the process of updating your computers’ firmware and key applications to protect you, your systems, and your patients and clients.Read More
Meltdown and Spectre computer vulnerabilities affect HIPAA Covered Entities and Business Associates. Every computer, phone, and tablet is impacted. Take these steps to protect yourself and update your systems.Read More