Use this checklist to determine if your policies, procedures and on-going print device security maintenance are vulnerable to threats.
Error - something went wrong!
How to Prepare for Phishing Attacks
Understand the steps necessary to determine if your employees have the ability to recognize a phishing atta...
Other content in this Stream
CynergisTek will be hosting Booth 4009 in the exhibition hall. Stop by during the event to learn more about our services, meet with our team, and discuss your organization’s privacy and security conce
Phishing Scams in Healthcare: A Persistent Threat
Why Contingency Planning for Vendor Data Disputes Is Critical
A Strong Message on Improper PHI Disclosure to News Media
Breach Settlement Has Unusual Penalty
Mobile Devices in the Healthcare Academic Medical Center: Why Are They So Difficult to Control?
In today’s healthcare environment, mobile devices are rampant. Controlling the nature and method of data stored on these devices is not easy in most industries – and mobile devices in the...
Cyber Incidents in Healthcare: How Much Would You Pay?
Medicaid Data Breach Trends: An Analysis
Texas Retirement Agency Portal Breach Affects 1.25 Million
A CIO guide to building a dashboard for cybersecurity
Anthem Mega-Breach: Record $16 Million HIPAA Settlement
Aetna Hit With More Penalties for Two Breaches
HIPAA lets providers text patients, but is it secure?
Why Is Providing Patients Access to Records So Challenging?
HHS OIG Launches Cybersecurity Web Page
Changes to New California Privacy Law Exempts Some Healthcare Organizations
Much has been written about the potential impacts that the California Consumer Privacy Act of 2018 (CaCPA) could make on health care organizations and their business partners. The California...
Ethical hacking: What to look for in a pen tester
Responding to Ransomware Attacks: Critical Elements
Opioid Crisis Raises Tough Privacy Issues
Hospitals Fined $1 Million After TV Crews Film Patients