The search found 3759 results.
Blog
These days, having cyber insurance that covers a company for costs related to cyberattacks is an expected standard corporate practice. It is the last in the line of risk mitigation tools that lessens or defers your company’s cyber risk.
Blog
Though the days of robbing banks aren’t over, the attacks on the financial services sector have definitely evolved. Instead of coming up with an elaborate plan that includes avoiding the inevitable security cameras outside a bank, people with malicious intent are choosing a route that gives them access to a wealth of information from to comfort of their home, a cyberattack.
News
Six months ago, more than 5.1 million healthcare records were breached in a single month. As shocking as that number seems, it wasn’t much more significant than the 12-month average of almost 4 million. Not surprisingly, healthcare organizations have turned to cyber insurance to protect themselves from the enormous cost and liabilities associated with such attacks.
Blog
Enterprise organizations around the world rely on third-party software applications to keep their businesses running both securely and efficiently. These necessary relationships between enterprises and vendors, however, are known to be risky because they are a top attack vector for hackers.
Blog
In New Medicare Card is just like other big changes CMS has made, right?, the scale of the change presented by MACRA’s New Medicare Card initiative was compared to other recent changes the Centers for Medicare & Medicaid Services (CMS) has implemented. These included the introduction of the Medicare Part D program, and the rollout of the Medicaid expansion and The Affordable Care Act exchanges in 2014.
Blog
Not only is cybersecurity changing, but the most recent iteration of the general idea, centered around access management, is itself in flux — threats are constantly changing and technology is evolving faster than most industries can implement.
Blog
Near unanimous bipartisan support from Congress gave the Medicare Access and CHIP Reauthorization Act (MACRA) its first wave of attention in 2015.
But how it plans to fundamentally shift the way government programs measure and pay for healthcare services is likely to be what will make headlines going forward.
Disruption
Blog
Positive patient identification is the process of matching the right patient to the right medical records; misidentification can lead to duplicate and incomplete records, billing confusion, incorrect diagnoses, and significant patient safety risks.