Cybersecurity


Healthcare Cybersecurity in 2024

By David Finn – It is very difficult to talk about 2024 without starting from where we are ending 2023. We only need to go back to Thanksgiving to paint the picture of healthcare cybersecurity in 2023. Over Thanksgiving weekend, a single ransomware attack left 30 hospitals across 6 states without network services.



The Lock & Key of Healthcare: Encryption’s Role in Patient Privacy

By Art Gross – Back in the day, physical safeguards were all we had to protect patient files. In today’s world where most information is stored digitally, a filing cabinet and key can no longer do the trick. The utilization of data encryption stands as one of the most fundamental and effective methods to ensure the confidentiality and integrity of sensitive patient information.


How to Handle a Breach

By Art Gross – “You’ve been breached”: three words that no business owner ever wants to hear, but for which they should be prepared. Data breaches have become an unfortunate reality for many organizations, especially those in the healthcare industry. Protecting sensitive patient information is not just a matter of compliance; it’s a crucial component of maintaining trust and reputation.


A Dynamic Duo: Cybersecurity and Compliance

By Art Gross – Part of our Cybersecurity Awareness Month. In a world where health records are considered 50 times more valuable than credit card information on the dark web, the OCR’s basic requirements are no longer sufficient on their own. Covered entities and business associates need comprehensive solutions and cybersecurity training to avoid data breaches and safeguard their patient data.


The Rising Threat of Social Engineering Attacks in Healthcare

By Art Gross – Social engineering attacks involve manipulating individuals into divulging confidential information, providing unauthorized access, or executing actions that compromise the security of systems or data. Attackers exploit psychological and emotional factors to exploit employees’ trust and manipulate them into performing actions that put the organization’s sensitive information at risk.