A phishing attack occurs every minute and is the fastest growing cybersecurity threat today. Understand the steps necessary to determine if your employees have the ability to recognize an attack and how to be prepared for one.
Error - something went wrong!
Vendor Security Management
CynergisTek offers a Vendor Security Management program that regularly assesses, monitors, and manages your...
Other content in this Stream
Free Privacy and Security Incident Response Workshop in Kansas City
We invite you to attend our free Privacy and Security Incident Response Workshop on Wednesday, September 12th in Kansas City.
Eight Top Misconceptions About Managed Print Services
Our EVP of Managed Print Services Sean Hughes has encountered a number of common misconceptions over his 25-year career in healthcare delivery systems. Here are the eight he has heard most often.
Humana Notifying Victims of 'Identity Spoofing' Attack
WannaCry, Petya 1 year later: The good, the bad and the ugly
Improving Readiness: Meeting Cyber Threats | 2018 Report
Our report aggregated data from assessments performed in 2017 at hundreds of healthcare organizations across the nation to reveal an average 45 percent conformance with NIST CSF.
A Tribute to Outgoing Board Member David Finn
Selling (or Storytelling) Cybersecurity to the Board
This checklist describes seven tips to keep in mind when presenting cybersecurity to your organization's senior management or Board.
Free Privacy and Security Incident Response Workshop in St. Louis
We invite you to attend our free Privacy and Security Incident Response Workshop on Tuesday, August 21st in St. Louis.
Free Privacy and Security Incident Response Workshop in Denver
We invite you to attend our free Privacy and Security Incident Response Workshop on Thursday, August 16th in Denver.
Free Privacy and Security Incident Response Workshop in Chicago
We invite you to attend our free Healthcare Privacy and Security Incident Response Workshop on Wednesday, July 25th in Chicago.
MD Anderson Cancer Center Fined $4.3 M For Data Breach
Deception technology applied to pharma cybersecurity
Cyber Crime: Print and Save This Article — You May Not Be Able to After Ransomware Strikes
A year after WannaCry, healthcare organizations face mounting cyberthreats
Employees Suspended for Alleged Record Snooping
MD Anderson will pay $4.3 million fine to HHS for data breaches
Planning to Fail? And Did You Know?
When is data collected for research PHI covered by HIPAA and when is it not?
On June 1, 2018, an OCR ALJ decision imposed civil monetary penalties against the University of Texas MD Anderson Cancer Center for data that was on two lost thumb drives and a stolen laptop. MD...
The 4 Most Commonly Missed Endpoint Devices in Healthcare
“Endpoint” is a term that seems to have a variable definition in many of today’s organizations. Like the name itself suggests an endpoint is simply any connected device capable of processing,...
Why penetration testing is key to protecting networks