Breach Prevention & Response

News, Tips & Best Practices for Preventing and Responding to Incidents and Breaches

  • The Top Four Healthcare Cybersecurity Trends for 2018

    The Top Four Healthcare Cybersecurity Trends for 2018

    In order to explore the likely cybersecurity trends coming our way in 2018, we must first take a quick look back at 2017. Last year was a banner year in about as many ways as one can think of....

    Read More
  • HIPAA Enforcement: 2017 Year in Review

    HIPAA Enforcement: 2017 Year in Review

    2017 will go down as a change year for Health Insurance Portability and Accountability Act (HIPAA) enforcement of the Privacy, Security, and Breach Notification Rules. This comes on the heels of...

    Read More
  • HIPAA Enforcement: The 2018 Outlook

    HIPAA Enforcement: The 2018 Outlook

    Read More
  • Ransomware Focus Limits Healthcare IT Progress in 2017

    Ransomware Focus Limits Healthcare IT Progress in 2017

    Read More
  • Stop the Insanity: Physician’s Information Security Practices Must Change to End Cyberattacks

    Stop the Insanity: Physician’s Information Security Practices Must Change to End Cyberattacks

    Read More
  • ×

    Learn How to Find & Stop Attacks Faster

    First Name
    Last Name
    Company
    Phone Number
    Thank you!
    Error - something went wrong!
  • 2017 Health Data Breach Tally: An Analysis

    2017 Health Data Breach Tally: An Analysis

    Read More
  • Clinical Research: The EHR Can Be Your Friend If You Want It To Be

    Clinical Research: The EHR Can Be Your Friend If You Want It To Be

    Read More
  • Uniting Print and Digital Security in Healthcare: Why Your Fancy Cybersecurity Solution Isn’t Enough

    Uniting Print and Digital Security in Healthcare: Why Your Fancy Cybersecurity Solution Isn’t Enough

    Read More
  • 8 Lessons Learned on Perimeter Security for all Healthcare Executives

    8 Lessons Learned on Perimeter Security for all Healthcare Executives

    Read More
  • Countdown to 2018: Top Health IT Security Trends

    Countdown to 2018: Top Health IT Security Trends

    Read More
  • Offshoring PHI: Addressing the Security Issues

    Offshoring PHI: Addressing the Security Issues

    Read More
  • 'Do's and Don'ts' for Dealing with Regulators

    'Do's and Don'ts' for Dealing with Regulators

    Read More
  • Guide to Proactive Access Monitoring and Auditing Under the HIPAA Security Rule

    Guide to Proactive Access Monitoring and Auditing Under the HIPAA Security Rule

    Monitoring and auditing of access to protected health information by many organizations is prompted by patient complaints or some other event triggering the need to conduct an investigation. This...

    Read More
  • GAO: CMS Must Improve Medicare, Medicaid Anti-Fraud Efforts

    GAO: CMS Must Improve Medicare, Medicaid Anti-Fraud Efforts

    Read More
  • Insider Allegedly Steals Mental Health Data of 28,000 Patients

    Insider Allegedly Steals Mental Health Data of 28,000 Patients

    Read More
  • What is the NH-ISAC 90-Day DMARC Challenge?

    What is the NH-ISAC 90-Day DMARC Challenge?

    Healthcare organizations are more vulnerable to phishing attacks as the average maturity of security controls and training is less than that of other industries, such as banking. Successful...

    Read More
  • Lawsuit: Hospitals Lied About Providing Quick Records Access

    Lawsuit: Hospitals Lied About Providing Quick Records Access

    Read More
  • Closing the Security Gap: How Many Devices are on Your Network?

    Closing the Security Gap: How Many Devices are on Your Network?

    Read More
  • How to Prepare for Phishing Attacks

    How to Prepare for Phishing Attacks

    Understand the steps necessary to determine if your employees have the ability to recognize a phishing attack and how to be prepared for one.

    Read More
  • Printer & MFD Security Checklist

    Printer & MFD Security Checklist

    Use this checklist to determine if your policies, procedures and on-going print security maintenance are vulnerable to threats.

    Read More
  • loading
    Loading More...