Blog Listing

Third-party vendors and HIPAA compliance
Third-party vendors and HIPAA compliance
Considering the risks of HIPAA non-compliance, health care companies generally benefit from hiring third party vendors that specifically handle HIPAA regulatory compliance. To fully protect patients, these vendors should have clear policies that restrict access, remain transparent and auditable, and maintain the most updated data security measures.
Keep your third-party vendors close
Keep your third-party vendors close
Whether you work with only a few vendors, hundreds, or thousands, your network is only as safe as the security practices of your weakest partner.
IoT threats to third-party networks
IoT threats to third-party networks
Outsourcing offers key advantages in costs and subject matter expertise. Yet, the safety of your business data depends on IoT risk management and the security protocols of vendor partners.
Healthcare cybersecurity: Hacking medical devices
Healthcare cybersecurity: Hacking medical devices
Imagine in the future a critical, personal medical device taken offline by ransomware. Is the Healthcare industry prepared for this cybersecurity risk?
Teamviewer: Hacked or not?
Teamviewer: Hacked or not?
Underscoring the danger of insecure network connections, hackers appear to be targeting TeamViewer - and the company is denying it.
Top cybersecurity experts talk trending threats
Top cybersecurity experts talk trending threats
A look into the trends forecasted by the biggest influencers in the cybersecurity community - here's the top four for 2016.
The Pearson VUE hack: How the credential manager system data breach occurred
The Pearson VUE hack: How the credential manager system data breach occurred
Pearson Vue, a third-party certification manager, discovered malware on their Credential Manager System. Major clients, like Cisco, Oracle, and IBM react.
Rising cost of healthcare data breaches
Rising cost of healthcare data breaches
In order to know the true cost of exposed medical records, it’s important to understand why this information is targeted. Learn more in this article.
Only 10% of CFOs feel prepared for cyber-attack
Only 10% of CFOs feel prepared for cyber-attack
The Chief Financial Officer (CFO) is the latest voice from the boardroom professing serious concern about their level of cyber-attack preparedness.
Securing EMR data with access monitoring
Securing EMR data with access monitoring
.node__body h2 { font-family: proxima-nova, sans-serif; font-size: 2.6rem; line-height: 3rem; font-weight: 400; } @media scree
Third-party access vulnerabilities cause 1/3 of retail breaches
Third-party access vulnerabilities cause 1/3 of retail breaches
New study shows 33% of data breaches in the retail space were due to third-party vendor access vulnerabilities.
VPNs at the root of home depot data breach
VPNs at the root of home depot data breach
In a not-surprising announcement yesterday, Home Depot reported: “Criminals used a third-party vendor’s user name and password to enter the perimeter of Home Depot’s network.