• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:healthcare

Traversing from healthcare attacks to HIPAA compliance

Log360 | November 7, 2022

Traversing from healthcare attacks to HIPAA compliance

Healthcare organizations are unarguably popular targets for cyberattacks. With an...

A security analyst's guide to understanding ransomware: The healthcare edition [E-book]

Log360 | July 19, 2022

A security analyst's guide to understanding ransomware: The healthcare edition [E-book]

If you're an IT security specialist, you're probably familiar with the overwhelming...

Establishing a least privilege environment in healthcare organizations [E-book]

Log360 | June 9, 2022

Establishing a least privilege environment in healthcare organizations [E-book]

Did you know that by selling a single health record on the dark web, an attacker can get...

7 types of cyberthreats plaguing the healthcare industry

Endpoint Central | March 1, 2022

7 types of cyberthreats plaguing the healthcare industry

Ideally, healthcare would be the last industry to be targeted by hackers and...

Five worthy reads: The never-ending love story between cyberattacks and healthcare

General | August 6, 2021

Five worthy reads: The never-ending love story between cyberattacks and healthcare

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Leveraging IoT to target pain points in the healthcare industry

General | June 26, 2020

Leveraging IoT to target pain points in the healthcare industry

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Log360 | March 4, 2020

Securing IT in healthcare organizations: All you need to know

From maintaining electronic health records and generating medical reports, to carrying out...

Five worthy reads: A look at the healthcare sector's persistent insider threat

General | March 8, 2019

Five worthy reads: A look at the healthcare sector's persistent insider threat

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Password Manager Pro | March 13, 2012

Unauthorized access and use of protected health information is the most profitable crime in the USA: Are you fully prepared to combat? [Part-2]

In the previous post , we analyzed the magnitude of medicare fraud,...