Clyde Hewitt

Content Authored by or Featuring Clyde Hewitt

  • Cybersecurity Impact of Microsoft’s End to Windows 2007 Support

    Cybersecurity Impact of Microsoft’s End to Windows 2007 Support

    Read More
  • Tying Up Loose Ends for Health Data Privacy, Security

    Tying Up Loose Ends for Health Data Privacy, Security

    Read More
  • Potential Iranian Cyber Attack: Where Do I Begin?

    Potential Iranian Cyber Attack: Where Do I Begin?

    Have you been considering where to begin when it comes to a potential Iranian cyber attack? Get insight into how your organization can be more prepared.

    Read More
  • Why Cyber Resilience Matters to the CFO

    Why Cyber Resilience Matters to the CFO

    The evidence is clear, healthcare providers that underfund their cyber resilience plans suffer serious financial impacts following a security breach or ransomware attack. The immediate needs are...

    Read More
  • The Growing Threat of Ransomware

    The Growing Threat of Ransomware

    Read More
  • Health Data Breaches: 3 Lessons Learned

    Health Data Breaches: 3 Lessons Learned

    Read More
  • Attackers Demand $14 Million Ransom From IT Services Firm

    Attackers Demand $14 Million Ransom From IT Services Firm

    Read More
  • Latest Ransomware Attacks Show Diversity of Victims

    Latest Ransomware Attacks Show Diversity of Victims

    Read More
  • Ransomware Attack Hits Brooklyn Hospital Center; Some Patient Data Unrecoverable

    Ransomware Attack Hits Brooklyn Hospital Center; Some Patient Data Unrecoverable

    Read More
  • Skimming Malware Found on American Cancer Society Webstore

    Skimming Malware Found on American Cancer Society Webstore

    Read More
  • Clinics Serving Uninsured Hit by Ransomware

    Clinics Serving Uninsured Hit by Ransomware

    Read More
  • Ransomware attacks on hospitals will worsen if security doesn't improve

    Ransomware attacks on hospitals will worsen if security doesn't improve

    Read More
  • 5 ways to better manage medical device risk

    5 ways to better manage medical device risk

    Read More
  • Medical Device Cybersecurity: 3 Alerts Issued

    Medical Device Cybersecurity: 3 Alerts Issued

    Read More
  • Third-Party Security: Guarding Against Complacency

    Third-Party Security: Guarding Against Complacency

    Read More
  • What Cybersecurity Risks does Bluetooth® Face?

    What Cybersecurity Risks does Bluetooth® Face?

    New Vulnerabilities Recently Discovered in Bluetooth ® Paring Specifications Vulnerability Overview Hospitals and other providers rely heavily on Bluetooth® connections for not only the ubiquitous...

    Read More
  • “We’ve been hacked! Go hire a cyber person NOW!”

    “We’ve been hacked! Go hire a cyber person NOW!”

    Read More
  • Industry Voices—6 human resources adaptations to address the cybersecurity workforce shortage

    Industry Voices—6 human resources adaptations to address the cybersecurity workforce shortage

    Read More
  • Rising Vulnerabilities of Medical Devices

    Rising Vulnerabilities of Medical Devices

    Read More
  • How to align security strategy and avoid 'faxploitation'

    How to align security strategy and avoid 'faxploitation'

    Read More
  • loading
    Loading More...