CynergisTek provides a comprehensive selection of technical testing, assessment, security program development, and endpoint device security services. Our consultants are solely focused on the healthcare industry and are well-versed in its specific nuances. Our flexible delivery models allow for services to be offered on a standalone basis or as a customized package of services to fit your organization’s needs.
Error - something went wrong!
Other content in this Stream
The Risks of Healthcare's Continued Dependence Upon Fax
Documentation: The Necessary Evil of IT
One of the most dreaded terms in the world of information technology and security (IT/IS) is “documentation”. Not because it isn’t massively helpful to everyone, or really for any reason other...
The Top 9 Criteria Organizations Should Consider When Evaluating Medical Device Security
Read our checklist to learn criteria every healthcare delivery organization should consider when evaluating their medical device security program to effectively mitigate risks.
Medical Device Cyber Risk: An Enterprise Problem
Medical Devices: The Risks Go Beyond Security
Watch our latest webinar on medical device security hosted by David Finn, EVP of Strategic Innovation at CynergisTek, Cory Blacketer, Information Security Consultant – Medical Device Security at Cyner
3 Major Misconceptions About Managed Print Services in Healthcare
Security’s Greatest Enemy: Endpoints Disguised as ‘Stuff’
Endpoint Device Security: Addressing the Hidden and Neglected Endpoints
The number of devices connected to a single hospital network is overwhelming. For example, a typical hospital has 10 pieces of biomedical equipment for every licensed bed – many of those are networked
How to assess IoT risks that fly under the radar
Web Application Penetration Testing
I have been writing about penetration testing and its related skills for some time now but haven’t yet taken a good deep dive into web application penetration testing. In many ways, web...
Ransomware Attack Leads to Discovery of Lots More Malware
LabCorp Still Recovering From Ransomware Attack
Travel-Related Breaches: Mitigating the Risks
Investigating and Assessing Incidents Reported by a Vendor
What would you do if one of your third-party vendors compromised your patients’ health information? Not your problem, right? Wrong. Even though the third party potentially breached your patients’ sens
Would More Telehealth Bring New Privacy, Security Concerns?
What About Connected Devices?
Improving Readiness: Meeting Cyber Threats | 2018 Report
Our report aggregated data from assessments performed in 2017 at hundreds of healthcare organizations across the nation to reveal an average 45 percent conformance with NIST CSF.
Selling (or Storytelling) Cybersecurity to the Board
This checklist describes seven tips to keep in mind when presenting cybersecurity to your organization's senior management or Board.
The 4 Most Commonly Missed Endpoint Devices in Healthcare
“Endpoint” is a term that seems to have a variable definition in many of today’s organizations. Like the name itself suggests an endpoint is simply any connected device capable of processing,...
Channel Chat: Securing the Office