- See How Your Cybersecurity Program Compares to Your Peers
Aggregated assessment scores from hundreds of facilities across the U.S. including from business associates to critical access hospitals, and large health systems to large academic medical centers.
- Discover the Average NIST Function Conformance
Based on the five Core Elements of the Framework: Identify, Protect, Detect, Respond and Recover
- Receive Strategies and Tactics to Address the Biggest Challenges in Cybersecurity
CynergisTek subject matter experts highlight the trends we saw and best practices to overcome those challenges.
- Understand Why Just Compliance Does Not Equate to Security
Several organizations have a lot of room for improvement against NIST CSF, yet passed when analyzed against HIPAA.
This article discusses the impacts of three attempted ransomware attacks on three different healthcare orga...
Other content in this Stream
Caleb Barlow and David Finn discuss how healthcare systems and corporations continue to handle data challenges and privacy and protection of critical patient and employee data during COVID-19.
Ransomware is a trending topic for healthcare in 2020. The following checklist delivers tips and best practices to enhance your posture when dealing with ransomware.
Our third annual report, Moving Forward: Setting the Direction, our analysts combed through data of the nearly 300 assessments performed to show the state of healthcare security in 2020.
Threat Actors Exploitation of COVID-19 Pandemic – Increased Threats to Medical Facilities On April 20, The FBI’s Weapons of Mass Destruction Directorate in Coordination with the Office of Private...
Our team of our experts puts together a checklist to help organizations plan for an incident response during the COVID-19 crisis. They discuss 30/60/90 day planning around privacy and security.
The unprecedented times we are living in continue to evolve. In a rare move, the U.S. Department of Homeland Security (DHS), the Cybersecurity and Infrastructure Security Agency (CISA), and the...
A new COVID-19 project from one of Google’s sister companies is the latest big-tech foray into healthcare to spark privacy concerns.
Background on Incident Response During Coronavirus Pandemic The coronavirus pandemic has pushed many healthcare organizations to allow an increased number to shift to a remote workforce...
This checklist explains a 30/60/90 day plan from a CISO’s perspective during the COVID-19 crisis! Check out the full list today!
Hackers have wasted no time figuring out how to exploit the worldwide COVID-19 pandemic.
It might be tempting for covered entities and business associates to put-off some of their regulatory or compliance obligations as other priorities evolve in the current crisis. Whether to do that...
The Health Sector Cybersecurity Coordination Center (HC3) has published a new alert. Please distribute through your proper channels, as appropriate. A malicious website pretending to be the live...
In recent months, officials around the world have raised security alarms about the dangers of “juice jacking” while travelers plug phones directly into the free USB while traveling.