New Healthcare Cybersecurity Threats Reported
As hackers become more sophisticated, it is important to keep up to date with new threats. There are two new threats that are concerning in that they are difficult [...]
As hackers become more sophisticated, it is important to keep up to date with new threats. There are two new threats that are concerning in that they are difficult [...]
Dental office administrative staff are often overburdened with a multitude of tasks, especially as of late with staffing shortages across the country. These staff members are often required to [...]
Malware and ransomware attacks have become more prevalent in recent times across all industries and market sectors. Large-scale attacks such as the ones perpetrated on Colonial Pipeline [...]
Each year, IBM Security and Ponemon Institute publish their “Cost of a Data Breach Report” in which they assess the previous year’s data breaches. In the 2021 breach report, [...]
Although the HHS has long stressed the importance of ePHI security, with the influx of healthcare breaches, it is clear that many organizations have not heeded the [...]
On July 16, 2021, the Campbell, Conroy & O’Neil law firm published a press release revealing that they had been targeted by a PHI ransomware attack in February 2021. [...]
Although many businesses have returned to regular operations, there is still a large portion of workers that continue to work remotely, or work on a hybrid schedule. It seems [...]
In 2008, the National Institute of Standards and Technology (NIST) organization published guidance as to how covered entities and business associates were expected to implement HIPAA Security Rule requirements. [...]
Ransomware attacks continue to rise, especially those targeting healthcare organizations. Hackers often target healthcare organizations in ransomware attacks to disrupt operations in hopes that the organization will pay a [...]
On April 20, 2021, Elekta, a cancer software provider, was targeted by a healthcare ransomware attack. Through the attack, hackers were able to access Elekta’s cloud-based software, used to [...]