HIPAA compliance is not enough to protect patient data. For that, you need a more comprehensive plan. You need a security framework.
See the top five cyber security frameworks in healthcare. Is your framework on the list?Continue reading
A nasty strain of malware has infected hundreds of thousands of routers – and it’s worse than initially thought.
See who is vulnerable to VPNFilter, how it works, and who might be responsible for launching it.Continue reading
The Verizon DBIR is one of the most respected cyber security reports published each year – but can you trust the data?
See errors we found in the new 2018 edition of the DBIR. Decide for yourself if the report is trustworthy.Continue reading
Most IT firms have clients from a range of industries. That means you encounter a wide range of security threats. How do you know which threats are the most important to focus on?
Check out the leading causes of data breaches across eight sectors. You’ll see attack trends in retail, healthcare, finance, government, and more – and even a few surprises.Continue reading
Do you have the right priorities in healthcare cyber security?
You might be surprised to learn that data breaches in healthcare are often different than in other industries. They’re more often caused by insiders, not by malware.
Check out the highlights of a new report from Verizon on the top causes of data breaches in healthcare. You’ll see the top causes reported from 2015 to 2017.Continue reading
If you saw only the headlines, you might think healthcare had a terrible year in cyber security – maybe worse than ever. But a new report shows, in many ways, the industry gained ground last year.
See highlights of the newest stats on data breaches in healthcare. See where more work is needed and get a few talking points to share with your clients.Continue reading
Two massive chip vulnerabilities are here and the security industry is scrambling for answers. Misinformation is everywhere, and even the patches are wreaking havoc.
Find the answers to your questions on Spectre and Meltdown in this post. You’ll see the problem, the solution, and know which rumors are fake news.Continue reading
Another year of cyber attacks is almost behind us. We’ve seen global ransomware epidemics, destructive lone-wolf hackers, and the tripling of the worst data breach ever reported.
Join us for a review of the top attacks in 2017. You’ll see how they happened so you can avoid making the same mistakes.Continue reading