Risk Management

News, Tips and Best Practices for Reviewing or Implementing a Risk Management Program

  • Welcome To Your Worst Day Ever: A Ransomeware Preparedness Seminar0:00

    Welcome To Your Worst Day Ever: A Ransomeware Preparedness Seminar

    The threat of a ransomware incident in healthcare looms over the minds of many healthcare, executives and boards. Those who have already had the misfortune to deal with a ransomware incident will like

    Watch Video
  • Offensive Security Services

    Offensive Security Services

    CynergisTek's offensive security services test an organization's environment and people to validate the effectiveness against cyber attacks.

    Read More
  • A look at Darkside ransomware. Ransomware attacks on schools are up. REvil hits Acer. California state employee exposes COVID patient data.

    A look at Darkside ransomware. Ransomware attacks on schools are up. REvil hits Acer. California state employee exposes COVID patient data.

    Caleb Barlow offers commentary on the recent story about a California state employee exposing the COVID-19 test and tracking data of more than two thousand people.

    Read More
  • Learn Why Cybersecurity Should Be Everyone's Business

    Download
  • California breach highlights contact tracing data vulnerabilities

    California breach highlights contact tracing data vulnerabilities

    Caleb Barlow offers commentary on the recent story about a California state employee exposing the COVID-19 test and tracking data of more than two thousand people.

    Read More
  • ‘Accountability framework’ proposed to promote secure health care practices

    ‘Accountability framework’ proposed to promote secure health care practices

    David Finn covers a new report from the CyberPeace Institute highlighting the toll that cyberattacks are taking on the health care industry.

    Read More
  • How Mature is Your Cybersecurity Program?

    Learn More
  • Data extortion attempts signal new era for ransomware tactics

    Data extortion attempts signal new era for ransomware tactics

    Caleb Barlow covers a new report from Crowdstrike revealing that 97 healthcare organizations victimized by ransomware attacks using extortion in 2020.

    Read More
  • Healthcare Cybersecurity Sets New Course of Action in 2021

    Healthcare Cybersecurity Sets New Course of Action in 2021

    Caleb Barlow discusses how the increase in cyberattacks compromises both patient safety and weakens trust in the healthcare sector and how they must implement a three-point action plan to change.

    Read More
  • Microsoft Exchange Server Breach

    Microsoft Exchange Server Breach

    In this infographic, we depict Microsoft Exchange Server Breach response procedures if exploitation activity is discovered.

    Read More
  • Cybercriminals post health system employee information online

    Cybercriminals post health system employee information online

    Caleb Barlow details how a hacker group known for ransomware attacks posted sensitive employee files online following a cyberattack at a New Mexico health system.

    Read More
  • Ransomware Attack's Economic Impact: $67 Million

    Ransomware Attack's Economic Impact: $67 Million

    Marti Arvin discusses ransomware attacks and other disruptive cyber incidents that have been surging in the healthcare sector, especially during the COVID-19 pandemic.

    Read More
  • A Different Perspective to Understanding Healthcare Risk Case Study

    A Different Perspective to Understanding Healthcare Risk Case Study

    Read our case study that breaks down a Security Control Validation Assessment (SCVA) which was performed to challenge the assumptions on our clients' security posture.

    Read More
  • Seven Strategies From The Pandemic To Protect Healthcare From Ransomware

    Seven Strategies From The Pandemic To Protect Healthcare From Ransomware

    Caleb Barlow discusses the rise of ransomware attacks in healthcare and breaks down seven strategies that can protect healthcare organizations from ransomware.

    Read More
  • Why Working With a Security Consulting Partner Can Help Reduce Cyber Risk

    Why Working With a Security Consulting Partner Can Help Reduce Cyber Risk

    The market for working with a security consulting partner has increased. Working with a security consulting partner can help your cybersecurity strategy.

    Read More
  • Security Validation and Why Should it be the New Mindset in 2021

    Security Validation and Why Should it be the New Mindset in 2021

    While the concept of security validation has been around for some time, at CynergisTek we recommend that security validation become the ethos of all organizations to strengthen one’s cyber hygiene.

    Read More
  • Privacy and Security Issues in Healthcare in Mergers and Acquisitions

    Privacy and Security Issues in Healthcare in Mergers and Acquisitions

    WIth security and privacy integration risks in mergers and acquisitions, knowing the right questions to ask and understanding the answers being provided could be the key to making the deal happen.

    Read More
  • Clinical Trials at Risk: Mitigating against Cyberattack

    Clinical Trials at Risk: Mitigating against Cyberattack

    Caleb Barlow details the COVID-19 pandemic increased risk of cyberattacks for clinical trial sponsors and vendors and describes how cyberattacks have evolved over the last several years.

    Read More
  • API & Information Blocking: Where are your risks and what you can do to prepare59:43

    API & Information Blocking: Where are your risks and what you can do to prepare

    A technical session on “API & Information Blocking: Where are your risks and what you can do to prepare” to learn about how to identify security vulnerabilities for CTEK Subject Matter experts.

    Watch Video
  • API Sentry Service Overview Sheet

    API Sentry Service Overview Sheet

    API Sentry is an on-going managed service bringing visibility to the security health of third party and in-house APIs.

    Read More
  • Security Control Validation Assessment Overview Sheet

    Security Control Validation Assessment Overview Sheet

    Security Control Validation Assessment measures the capability of your security teams, processes, and technology to determine the organization's overall business risk.

    Read More
  • Adversary Validation Service Overview Sheet

    Adversary Validation Service Overview Sheet

    Adversary Validation discovers vulnerabilities with no disruption to network operations and allows your organization to remediate before the malicious hacker can exploit your environment.

    Read More
  • loading
    Loading More...