A phishing attack occurs every minute and is the fastest growing cybersecurity threat today. Understand the steps necessary to determine if your employees have the ability to recognize an attack and how to be prepared for one.
Error - something went wrong!
Patient Privacy Monitoring Services
Our Patient Privacy Monitoring Services allows you to extend the depth and breadth of your privacy program’...
Other content in this Stream
Why penetration testing is key to protecting networks
Health System Seeks Patients' Help to Mitigate Email Mishap
Are We Solving The Right Problem?
WannaCry, NotPetya, and Cyberwarfare's Threat to Healthcare
Colorado's Tougher Breach Law: Healthcare Incidents Included
Channel Chat: Securing the Office
Medical Device Cyber Vulnerabilities: More Alerts
Another Fitness App Exposes Users' Data
Building and Maintaining an Effective Compliance Program with Limited Resources
It is often said an effective compliance program is difficult to measure, but experienced compliance professionals “know it when they see it”. This is not much comfort to many compliance...
6 Ways Third Parties Can Trip Up Your Security
Yet Another Twist in Messy Aetna Privacy Breach Case
Unusual Breach Report by Humana Shines Light on Fraud Prevention
Mental Health Provider Pays Ransom to Recover Data
Printing is Increasing Post-EHR Adoption...and So Are the Security Risks
Enhancing Cybersecurity Response in Healthcare
Security of Biomedical Devices Presents Unique Challenges
Mac McMillan on Why Improving Cyber Readiness is a Business Imperative
Five Best Practices to Improve Your Third-Party Risk Management Program
Each third-party vendor relationship comes with a selection of risks that must be recognized in time. These third-party risks are usually multi-dimensional because they extend across other...
ER Staffing Firm Breach Raises Complex Questions
NY AG Schneiderman Quits: What's Next for Enforcement?