The search found 3759 results.
Blog
News broke recently that a water plant in Florida, which provides water to businesses and around 15,000 residents, was permeated by a hacker. The hacker increased the amount of sodium hydroxide in the water treatment system to more than 10,000% of the normal ratio.
Blog
Monitoring is the 5th element of the 7 elements of an effective compliance program. It is a continuous task that compliance and privacy teams must do to ensure any inappropriate accesses are detected and resolved in a timely manner.
Blog
Working with vendors, business partners, and other third parties is a fact of life for most organizations. However, once vendors are selected, vetted, and onboarded, they will often be given remote access to your network, and that’s where problems can arise.
Whitepaper
Maintaining patient privacy is an ongoing necessity for healthcare organizations – but it’s not enough to tick items off a checklist to ensure that patient data remains protected.
Blog
Understanding critical information, critical access points, and how to best employ critical access management begins with three key aspects: frequency, risk, and urgency.
Blog
A leading Customer Experience expert in the Healthcare IT industry shares her strategy for developing a truly unique & empowering customer experience
Blog
Whether you’re a small business or a global enterprise, over the last decade or so outsourcing business functions to third-party vendors has become essential to your business operations. Vendors are used in nearly every business process.
News
As much as any industry, healthcare must deal with a security landscape that is fraught with challenges and tensions. Health delivery organizations (HDOs) operate under constant threat of cyberattacks and ransomware attempts. Every year, they report an increasing number of breaches – and that was before the COVID-19 pandemic forced the industry pivot to telehealth and work from home (WFH). These “new normal” modes of work delivered myriad benefits to both patient and provider, but they also greatly increased the number of high-risk endpoints vulnerable to the ploys of cyber criminals.
Blog
Major data breaches are a destructive reality– and the problem is growing. According to a Ponemon Institute study, 59% of companies said that they have experienced a data breach caused by one of their vendors or third-parties.