CynergisTek provides a large selection of services that can be offered as a standalone engagement or as part of a managed service designed to fit your needs. Our team will act as an extension of your organization and offer pragmatic advice, concrete findings, and deliverables that outline areas of improvement while comparing you to similar organizations.
Error - something went wrong!
Other content in this Stream
3 Major Misconceptions About Managed Print Services in Healthcare
IoT Security: How to Effectively Manage Endpoint Device Security
IoT security is one of the most concerning and critical issues that we in healthcare face on a daily basis. All industries are affected by IoT devices threatening the integrity of their network...
Security’s Greatest Enemy: Endpoints Disguised as ‘Stuff’
Assessing Medical Device and IoT Security 4 Questions You Should Ask Yourself
The number of devices connected to a single hospital network is overwhelming. For example, a typical hospital has 10 pieces of biomedical equipment for every licensed bed – many of those are networked
How to assess IoT risks that fly under the radar
Web Application Penetration Testing
I have been writing about penetration testing and its related skills for some time now but haven’t yet taken a good deep dive into web application penetration testing. In many ways, web...
Ransomware Attack Leads to Discovery of Lots More Malware
LabCorp Still Recovering From Ransomware Attack
Travel-Related Breaches: Mitigating the Risks
Investigating and Assessing Incidents Reported by a Vendor
What would you do if one of your third-party vendors compromised your patients’ health information? Not your problem, right? Wrong. Even though the third party potentially breached your patients’ sens
Would More Telehealth Bring New Privacy, Security Concerns?
What About Connected Devices?
Improving Readiness: Meeting Cyber Threats | 2018 Report
Our report aggregated data from assessments performed in 2017 at hundreds of healthcare organizations across the nation to reveal an average 45 percent conformance with NIST CSF.
Selling (or Storytelling) Cybersecurity to the Board
This checklist describes seven tips to keep in mind when presenting cybersecurity to your organization's senior management or Board.
The 4 Most Commonly Missed Endpoint Devices in Healthcare
“Endpoint” is a term that seems to have a variable definition in many of today’s organizations. Like the name itself suggests an endpoint is simply any connected device capable of processing,...
Channel Chat: Securing the Office
Medical Device Cyber Vulnerabilities: More Alerts
Building and Maintaining an Effective Compliance Program with Limited Resources
It is often said an effective compliance program is difficult to measure, but experienced compliance professionals “know it when they see it”. This is not much comfort to many compliance...
Learning The Basics of Biomedical Security…From Ebola
Public Health In 2014 and 2015, the world faced a major health crisis when individuals throughout the world were being exposed to the Ebola virus. Because of the highly contagious nature of the...
Biomedical Device Security Services