- See How Your Cybersecurity Program Compares to Your Peers
Aggregated assessment scores from hundreds of facilities across the U.S. including from business associates to critical access hospitals, and large health systems to large academic medical centers.
- Discover the Average NIST Function Conformance
Based on the five Core Elements of the Framework: Identify, Protect, Detect, Respond and Recover
- Receive Strategies and Tactics to Address the Biggest Challenges in Cybersecurity
CynergisTek subject matter experts highlight the trends we saw and best practices to overcome those challenges.
- Understand Why Just Compliance Does Not Equate to Security
Several organizations have a lot of room for improvement against NIST CSF, yet passed when analyzed against HIPAA.
Error - something went wrong!
Detecting and Protecting: Why Security Incidents Keep Surprising Us
Why are we so bad at detecting and protecting against security incidents? Attackers need only find a single...
Other content in this Stream
What Can Healthcare Learn from the Marriott Data Breach?
DDoS protection, mitigation and defense: 8 essential tips
Phishing Scams in Healthcare: A Persistent Threat
Another Healthcare Website Security Issue Revealed
Attack on Billing Vendor Results in Massive Breach
CynergisTek and CHIME Collaborate on Healthcare Cybersecurity Program Research
In November of 2018, CynergisTek collaborated with CHIME to examine the top healthcare cybersecurity challenges for CIOs with its survey, “Addressing the Security Gaps in Health IT.” Through most...
Zero Days vs. Standard Ways
A few days ago, a new vulnerability was found that affects the security of encrypted data, specifically on full-disk encrypted drives using hardware encryption protocols. For some time now, it has...
3 Major Misconceptions About Managed Print Services in Healthcare
FDA Reacts to Critique of Medical Device Security Strategy
Mac McMillan Speaks to the Troubling Trend that Hospitals Still Aren’t Prioritizing Security
HHS Tries Again: New Cyber Coordination Center Launched
PODCAST: Managing the Aftermath of a Cyber Incident with a Strategic Incident Response feat. David Finn
Cyber Incidents in Healthcare: How Much Would You Pay?
Medicaid Data Breach Trends: An Analysis
Texas Retirement Agency Portal Breach Affects 1.25 Million
Analysis: Did Anthem's Security 'Certification' Have Value?
A CIO guide to building a dashboard for cybersecurity
IBM's cybersecurity semi is rolling into Austin
Obamacare System Breach Affects 75,000
Can't afford a security chief? Here are the alternatives