Log360 | November 7, 2022Traversing from healthcare attacks to HIPAA compliance Healthcare organizations are unarguably popular targets for cyberattacks. With an...
Log360 | July 19, 2022A security analyst's guide to understanding ransomware: The healthcare edition [E-book] If you're an IT security specialist, you're probably familiar with the overwhelming...
Log360 | June 9, 2022Establishing a least privilege environment in healthcare organizations [E-book] Did you know that by selling a single health record on the dark web, an attacker can get...
Endpoint Central | March 1, 20227 types of cyberthreats plaguing the healthcare industry Ideally, healthcare would be the last industry to be targeted by hackers and...
General | August 6, 2021Five worthy reads: The never-ending love story between cyberattacks and healthcare Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | June 26, 2020Leveraging IoT to target pain points in the healthcare industry Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Log360 | March 4, 2020Securing IT in healthcare organizations: All you need to know From maintaining electronic health records and generating medical reports, to carrying out...
General | March 8, 2019Five worthy reads: A look at the healthcare sector's persistent insider threat Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Password Manager Pro | March 13, 2012Unauthorized access and use of protected health information is the most profitable crime in the USA: Are you fully prepared to combat? [Part-2] In the previous post , we analyzed the magnitude of medicare fraud,...