HHS OCR: How Care Providers Can Avoid Falling Victim to ‘Cyber Extortion’
This week, the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) published a January newsletter with a focus on cyber extortion. The healthcare industry is in the...
Top 6 Security Takeaways from HIMSS 2018
Amid the Las Vegas lights, the Sands Expo was abuzz during the Healthcare Information and Management Systems Society (HIMSS) which gathered over 45,000 attendees to discuss the latest Innovations...
The Future of Securing Patient Data: How the Health Industry is Addressing the Healthcare Cybersecurity Skills Shortage
The cybersecurity skills gap will reach 1.8 million by 2022, according to the Global Information Security Workforce Study. The healthcare industry specifically plans to increase their workforce by...
How Every Healthcare CISO Can Gain Time Back in their Day
Healthcare systems continue to face increasing challenges to secure patient data. From a 1988.6% increase in malware attacks since 2015 to data theft fueling the opioid crisis, the challenge for...
Secure the Keys to Your Kingdom: Protect Your Organization’s Privileged User Accounts
If you were trying to break into a bank, would you rather go through the trouble of evading the physical and digital security measures (i.e. security guards, door access, vault passcodes, and...
A Multifaceted Approach to Healthcare Breach Prevention
Listen in as Dai Snyder, Delegated Oversight Program Manager of the Care Coordination Institute (CCI), discusses her multifaceted breach prevention efforts.
6 Considerations for Healthcare Organizations Building a Patient Data Privacy and Security Plan (Part 1 of 2)
As a care provider, you can instill trust through a strong data privacy and security program. Here are six considerations for creating a comprehensive patient data privacy and security plan.
5 More Considerations for Healthcare Organizations Building a Patient Data Privacy and Security Plan (Part 2 of 2)
When devising a patient data privacy and security plan, healthcare organizations need to consider these five things to ensure they leave no gaps.
Privileged User Monitoring: 5 Ways to Prevent Privileged User Abuse in Salesforce
By using privileged user activity monitoring, you can prevent insider threats like privileged user abuse in Salesforce.
5 Reasons Why Privileged User Abuse is a Top Security Concern in the Cloud
Data security should prevent external attacks and insider threats because privileged user abuse is a top concern in the cloud. Find out more about preventing insider abuse in this article.