PHI Personal Health Information
, , ,

How Protected Health Information hides in your network, and how to stop it.

One of the primary goals of a HIPAA compliance Risk Assessment is to document where PHI is stored for your organization.
, , ,

The Power of HIPAA Training: Data Security & Compliance

Uncover the importance of HIPAA training: safeguard data, ensure compliance, and strengthen data security in healthcare organizations.
mitigate phishing email
, , , , ,

Protecting Patients: Understanding the Biggest Cyber Threats

The healthcare industry is at the forefront of technological advancements, with electronic health records (EHRs) and telemedicine being just a couple of examples of how technology has revolutionized patient care.
IT Literate Team
, , , ,

IT literacy is essential to keeping your organization secure

In today's world, information technology (IT) literacy has become a basic necessity for employees in almost every industry. As businesses continue to digitize and rely on technology,
#stopransomware
, , ,

Ransomware Continues Ravaging Companies

In recent years, ransomware attacks have become one of the biggest cyber threats for organizations of all sizes, causing significant financial losses and disrupting business operations. To combat this growing threat,
Pentagon Breach
, , ,

The Pentagon email breach will impact healthcare

The recently disclosed Pentagon email breach occurred in 2020 when a hacker gained unauthorized access to an email server used by the United States Department of Defense.
Lehigh Valley Health Network hit by cybersecurity attack targeting Delta Medix group
, , ,

Lehigh Valley Health Network hit by a cybersecurity attack

Recently, the Lehigh Valley Health Network (LVHN) was hit by a cybersecurity attack that targeted the Delta Medix group, a provider that LVHN has been working with since 2019. The attack occurred on January 11, 2022, and was discovered by LVHN on January 13, 2022.
Apple Releases Security Updates
, , ,

Apple Releases Security Updates

When it comes to cyber scams and attacks, by far the most vulnerable are the elderly. We can all help them to be more aware of what to look out for when they do venture online. Here are the most common scams targeting the elderly.
, ,

HIPAA Compliance 101

To become HIPAA compliant, your business will need to implement a number of physical, technical, and administrative safeguards to protect the confidentiality, integrity, and availability of protected health information (PHI).
HSS bad cookies
, , , ,

HHS warns cookies can be bad for your health information

Not all cookies are created equally. As a self-professed chocolate cookie aficionado, I can personally attest to this. But last week, the Department of Health and Services alerted us that cookies may also be bad for our health ... information.
, , , ,

A bit of egg on my face.

Well, this is a little embarrassing... Last week one of our promoted products, password manager LastPass, announced they had suffered a breach through a third-party cloud storage solution. They disclosed an unknown actor gained access to certain…
Cyber weakness
, ,

Three cyber holes to be aware of

Three cyber weaknesses you can prevent. The list of computer vulnerabilities is growing rapidly right now. While this is an ongoing trend, the pace has picked up of late. Some may blame Russia, but in truth, they're just one part of the…
, , , ,

The hole in your cybersecurity you may be overlooking

Unsecure Devices Most of you likely know that printers, scanners, and multifunction devices have been a weak link for cybersecurity for many network administrators. There are several reasons for this. First, like many networked medical devices,…
OCR Cybersecurity Training Online
, , , ,

OCR Training Video

Are You Tired of Hearing It? Just SHUT UP ALREADY - I know some of you are thinking that. We've been going on and on about the importance of cybersecurity training, and I know more than a few of you are getting tired of it. So what do we do…
Cybersecurity Training Online
, , , , ,

When cybersecurity training isn’t enough – what next?

Beyond Training - You Can't Stop There. We've talked a lot about training lately because it is the single best tool you have to keep your network secure. However, it's not bulletproof. Two weeks ago Microsoft issued patches for over 85 security…
Cybersecurity in healthcare
, , , , ,

Three ways to improve your cybersecurity

Three Steps You MUST Take Now. Cybersecurity professionals are sounding the alarm in agreement that we are about to experience another uptick in cybersecurity attacks. They cite numerous reasons for this coming storm. The most significant concern…