Security Officer or Professional

New, Tips and Best Practices for Security Professionals.

  • Free Privacy and Security Incident Response Workshop in Philadelphia

    Free Privacy and Security Incident Response Workshop in Philadelphia

    We invite you to attend our free Privacy and Security Incident Response Workshop on Wednesday, November 14th in Philadelphia.

    Read More
  • Free Privacy and Security Incident Response Workshop in Oklahoma City

    Free Privacy and Security Incident Response Workshop in Oklahoma City

    We invite you to attend our free Privacy and Security Incident Response Workshop on Thursday, November 8th in Oklahoma City.

    Read More
  • Free Privacy and Security Incident Response Workshop in Cincinnati

    Free Privacy and Security Incident Response Workshop in Cincinnati

    We invite you to attend our free Privacy and Security Incident Response Workshop on Thursday, October 25th in Cincinnati, Ohio.

    Read More
  • Lunch & Learn: Think Your Network is Safe? Check All of Your Endpoints

    Lunch & Learn: Think Your Network is Safe? Check All of Your Endpoints

    Join HP and CynergisTek on October 24th to discuss how attackers are utilizing endpoint devices in new ways to compromise a network and how you may be found noncompliant.

    Read More
  • Learn What We Found After Assessing Hundreds of Healthcare Organizations' Conformance with NIST CSF

    Learn More
  • Free Privacy and Security Incident Response Workshop in Tampa

    Free Privacy and Security Incident Response Workshop in Tampa

    We invite you to attend our free Privacy and Security Incident Response Workshop on Thursday, October 18th in Tampa.

    Read More
  • Free Privacy and Security Incident Response Workshop in Baltimore

    Free Privacy and Security Incident Response Workshop in Baltimore

    We invite you to attend our free Privacy and Security Incident Response Workshop on Thursday, September 20th in Baltimore.

    Read More
  • Cybersecurity: Innovating staff buy-in and avoiding silver bullet tools

    Cybersecurity: Innovating staff buy-in and avoiding silver bullet tools

    Read More
  • Security’s Greatest Enemy: Endpoints Disguised as ‘Stuff’

    Security’s Greatest Enemy: Endpoints Disguised as ‘Stuff’

    Read More
  • How Mature is Your Cybersecurity Program?

    Learn More
  • Five Best Practices to Improve Your Third-Party Risk Management Program

    Five Best Practices to Improve Your Third-Party Risk Management Program

    CynergisTek's Senior Director, Security Services Operations David Rauschendorfer recently wrote a blog post describing several steps healthcare organizations should take to manage potential third-part

    View Presentation
  • 5 Pitfalls to Avoid When Considering Security Staff Benchmarks

    5 Pitfalls to Avoid When Considering Security Staff Benchmarks

    Read More
  • Device Makers Combating Cyber Risks to Patient Health

    Device Makers Combating Cyber Risks to Patient Health

    Read More
  • Protecting Patient Information from Increased Cybersecurity Threats

    Protecting Patient Information from Increased Cybersecurity Threats

    Read More
  • Incident Response Planning: Paying NOT to Play

    Incident Response Planning: Paying NOT to Play

    If you’re reading this, I probably don’t need to tell you that an incident response plan is the best way to prepare for that information security or other cyber incident – from attack, to...

    Read More
  • HHS OIG Finds Security Flaws in Maryland's Medicaid System

    HHS OIG Finds Security Flaws in Maryland's Medicaid System

    Read More
  • McAfee threat research team uncovers healthcare security risks

    McAfee threat research team uncovers healthcare security risks

    Read More
  • Should Staff Ever Use Personal Devices to Access Patient Data?

    Should Staff Ever Use Personal Devices to Access Patient Data?

    Read More
  • Web Application Penetration Testing

    Web Application Penetration Testing

    I have been writing about penetration testing and its related skills for some time now but haven’t yet taken a good deep dive into web application penetration testing. In many ways, web...

    Read More
  • Hacker Halted Tackles “Life, the Universe, Everything” for 2018 edition with An Ethical Hacker’s Guide to the Universe

    Hacker Halted Tackles “Life, the Universe, Everything” for 2018 edition with An Ethical Hacker’s Guide to the Universe

    Read More
  • Numerous OpenEMR Security Flaws Found; Most Patched

    Numerous OpenEMR Security Flaws Found; Most Patched

    Read More
  • KLAS’s Recent Report on Cybersecurity Services Firms: What Are the Implications for HIT Leaders?

    KLAS’s Recent Report on Cybersecurity Services Firms: What Are the Implications for HIT Leaders?

    Read More
  • loading
    Loading More...