Blog Listing

Teaser Feature Image
7 Insights from Cisco’s 2019 CISO Benchmark Study
CISOs have many areas of risk to consider. Here are the top seven takeaways from the 2019 CISCO CISO Benchmark study that can help inform your organization’s security posture.
Teaser Feature Image
What CMS and ONC’s Proposed Rules on Data Blocking in Healthcare Mean for Patient Privacy, Security
What is data blocking, and what do the ONC and CMS's proposed rules mean for healthcare privacy, security, and interoperability?
An overlooked weapon in your cyber security arsenal: IAM
There’s no escaping the fact that cyber criminals are hitting healthcare hard.
Teaser Feature Image
4 Ways Healthcare Organizations use Machine Learning in Privacy
Machine learning helps not only with security, but privacy as well. Find out the top ways healthcare organizations are using machine learning in this blog post.
Teaser Feature Image
What We’re Excited About at the 2019 HCCA Compliance Institute
On April 7- 10, 2019, the Health Care Compliance Association (HCCA) is hosting its Compliance Institute in Boston. With over 100 sessions, networking opportunities, and an exhibit hall full of...
Teaser Feature Image
Monthly Cloud Security Roundup: The Top Cybersecurity Threat to the U.S. and More
Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss Facebook’s exposed passwords and more.
Teaser Feature Image
Migrating to the Cloud: 4 Considerations for CISOs
Flexibility, speed, scalability, security, and decreased infrastructure and maintenance costs all contribute to the allure of migrating to the cloud. But while the cloud offers benefits,...
Teaser Feature Image
Memorial Healthcare’s 10 Steps to a Holistic Patient Privacy Program
Memorial Healthcare System (MHS) is a longtime leader in high-quality healthcare services for South Florida residents. With over 13,000 employees, 1,800 beds, and 2,500 physicians, MHS is one of...
Teaser Feature Image
Last-Minute GDPR Checklist: Have You Completed These 6 Steps to GDPR Compliance?
The EU General Data Protection Regulation (GDPR) deadline is in just over one week. On May 25, GDPR will dramatically change the way businesses process, store, and transmit EU citizen data, making...
Teaser Feature Image
Is Your Cloud Vendor Taking Your Security & Compliance Posture Hostage?
Is your cloud vendor taking your security and compliance posture hostage? In this post, we offer lessons learned to help you break free from security and compliance challenges.
Teaser Feature Image
Insider Security Threats Now the Biggest Cybersecurity Problem for Financial Services Industry
Reports show that insider threats are the biggest cybersecurity problem in the financial services industry. In this post, discover how to combat the threat and mitigate risk to your organization.
Teaser Feature Image
Improving Patient Care: 5 Benefits of Interoperability in Healthcare
Interoperability is the extend to which systems can exchange and interpret shared data. In the healthcare industry, interoperability offers specific benefits that improve workflows and provide...
Teaser Feature Image
IBM Released Its 2018 Data Breach Study — and Financial Services and Healthcare Organizations are Taking Note to Maintain Customer Trust
IBM and Ponemon’s latest Cost of a Data Breach Report illustrates the dauntingly true cost of a data breach to an organization, from direct financial impact to reputational damage and churn. Below...
Teaser Feature Image
How Privacy and Security Can Overcome Interoperability Challenges in Healthcare
Patient privacy is key to providing quality healthcare – but so is data-sharing. Interoperability is quickly becoming a buzzword in healthcare, but one with backbone, as providers seek new ways to...
Teaser Feature Image
How HR Managers Can Prevent Data Loss in 2018 During Offboarding
Cybercrime took center stage in 2017 and 2018 will be no different. From ransomware attacks like Petya and WannaCry to the NSA breach, all signs point back to the root cause of these incidents as...
Teaser Feature Image
How Healthcare Data Security Lays the Foundation for Improved Patient Care
Technology is widespread in healthcare organizations and growing. In fact, 91 percent of U.S. healthcare organizations have undertaken or plan to undertake a technology adoption initiative in the...
Teaser Feature Image
How Every Healthcare CISO Can Gain Time Back in their Day
Healthcare systems continue to face increasing challenges to secure patient data. From a 1988.6% increase in malware attacks since 2015 to data theft fueling the opioid crisis, the challenge for...
Teaser Feature Image
Hospital Drug Diversion Prevention: Healthcare Workers Aren’t Immune to the Opioid Epidemic
With the opioid crisis and drug theft coming together, hospital drug diversion prevention is necessary to protect patients and organizations.
Teaser Feature Image
Hidden Risk for CIOs: A Guide to Managing Shadow IT Security
Shadow IT is rampant in many organizations, representing as much as 50 percent of a company's technology spending, on average. And it can have a number of consequences for a business. First and...
Teaser Feature Image
HHS OCR: How Care Providers Can Avoid Falling Victim to ‘Cyber Extortion’
This week, the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) published a January newsletter with a focus on cyber extortion. The healthcare industry is in the...