The search found 3766 results.
Blog
Since 2020, hospitals and healthcare organizations suffered brutal ransomware and phishing attacks during the COVID-19 pandemic. Healthcare cyber attacks came from all sides and caught facilities off guard, from the aggressiveness and sheer volume of hacks and cyber threats.
Blog
Let’s face it: When it comes to data security, ensuring your company’s compliance can be a headache, no matter the industry. Unfortunately, this problem is made even worse by the realization that compliance requirements extend beyond your internal operations.
Blog
Compliance teams in healthcare organizations have the important task of ensuring patient data is protected from unwarranted access. It is a crucial job within the organization, due to the fact that it is difficult to restrict access to medical workers in the healthcare setting, and restricting access to EMRs could make it more difficult for them to do their daily, or emergency-related tasks.
Blog
If you’re in the cybersecurity field, chances are you’ve heard of the castle-and-moat strategy of securing sensitive systems. This strategy focuses on securing the castle (or sensitive system) from external threats while placing minimal controls on trusted insiders.
Blog
When it comes to supply chain hacks, it’s not a matter of if, it’s a matter of when your organization will be hacked. Attacks on critical infrastructure and systems are on the rise, and with hackers gaining skill and in some cases getting paid out through ransomware attacks, that trajectory of supply chain hacking is only headed upwards.
Blog
The consensus is clear -- cloud deployment is the future of third-party access management. With increased security, the fact that most of the programs and data third parties access are already on the cloud, and many more benefits, switching to a cloud-first approach makes more sense than ever.
Blog
Learn what user access reviews are, the risks of not reviewing user access, and recommended user access review best practices. Read the blog.
Blog
A crucial aspect of cybersecurity was missing from Colonial Pipeline when a criminal hacking group was able to access a shared internal drive and demanded close to $5 million in exchange for the files: multi-factor authentication.
Blog
Protecting patient data is a Herculean task for healthcare organizations, as protections must be in place for internal and external threats. On top of that, HIPAA regulations add in a layer of required parameters that healthcare organizations must have in place to be compliant and not face penalties.
Blog
According to the 2021 Executive Order, “Zero Trust Architecture allows users full access but only to the bare minimum they need to perform their jobs. This data-centric security model allows the concept of least-privileged access to be applied for every access decision, where the answers to the questions of who, what, when, where, and how are critical for appropriately allowing or denying access to resources.”