Recent research conducted by Arete and Cyentia Institute sheds light on the ransomware landscape within the healthcare sector. The study reveals that healthcare organizations are more likely to pay ransoms than other industries. Additionally, the report highlights the low adoption of multi-factor authentication (MFA) and emphasizes the need for improved cybersecurity measures in the healthcare...
As we continue into National Cybersecurity Awareness Month, this week we focus on social media. Why does what you do in your personal life matter in your professional world? Aside from the possible personal implications, the risk to your cybersecurity also exists. How Hackers Work A cybercriminal knows how to gain access to your trust. ...
What Are the Most Common Healthcare Breaches? When it comes to protecting your business, the approach needs to extend beyond the locks on the doors. Cyber threats are the highest risk to your patient and data security. So what are the most common healthcare breaches that you should be on the lookout for regularly? Ransomware...
Healthcare businesses need to be aware of the requirements that come with a cybersecurity insurance policy. In a world of online profiles, splashy websites, and great social media campaigns, businesses can misrepresent themselves in more ways than one. A great photo of your team or a full biography may help create patient trust, but it...
Whether a change in your business structure came about from the pandemic, or it just makes more sense for your team, remote work is the norm for many more professionals today than it was in years past. If you’re in healthcare, this means that you need to factor in the HIPAA component as well as...
Under the HIPAA Privacy Rule, there must be one individual who is identified as the Privacy Officer. What does that mean? Is it a paid job? What are the requirements? Are they the ones who will be accountable in the case of a violation or if a data breach should occur? Every covered entity and...
With healthcare being a top target in the world of cybercrime, it never hurts to do a review every so often of the landscape and of the players in the game. We’ll also take a look at how you might be compromised without even knowing it or suspecting it could happen. A Lay of the...
At times, it feels as if we could start every week with this sentence: “There’s a new tactic being used by cybercriminals to trick unsuspecting victims.” And the sophistication level of the new tactics is off the charts. So, what are we dealing with as of late? Well, where should we start… Hidden text is...
We all know (or should know) that human error accounts for the majority of breaches. Phishing gives hackers entry to a business’s front door by manipulating the employees who work there. Phishing is when a cyberattack is disguised and delivered using email as the carrier or weapon. Through very convincing and cleverly designed messages, the...
Is the healthcare sector uniquely vulnerable to phishing attacks? A recent report published in the Journal of the American Medical Association says yes, with research to back that claim. A team of researchers led by William Gordon, MD of Harvard Medical School and Boston’s Brigham and Women’s Hospital set out to answer the question, “Are...
Recent Comments