Dave Bailey, Director of Security Services, discusses hospitals with limited resources can improve security by monitoring the enterprise's network 24/7. Watch this video to learn more.
Other content in this Stream
Security Control Validation Assessment measures the capability of your security teams, processes, and technology to determine the organization's overall business risk.
Adversary Validation discovers vulnerabilities with no disruption to network operations and allows your organization to remediate before the malicious hacker can exploit your environment.
The Security Awareness Tips list allows you to download, customize, and share tips and best practices to your clients to give them insight on how they can protect their data.
Our third annual report, Moving Forward: Setting the Direction, our analysts combed through data of the nearly 300 assessments performed to show the state of healthcare security in 2020.
Marti Arvin offers commentary for this article which focuses on the recent announcement from federal prosecutors who have agreed to pay $500,000 to settle the 2015 HITECH fraud case.
This article includes results from CynergisTek’s recent telehealth survey Telehealth & Data Security: Understanding the Risks and the use of hospitals using telehealth if their data has been hacked.
Caleb Barlow discusses in The CyberWire Daily Podcast how healthcare workers are leveraging medical records for their own curiosity and to understand who is really in their medical records.
CynergisTek's second annual report analyzed the results of assessments at hundreds of healthcare organizations against NIST CSF and the HIPAA Privacy and Security Rules.
An infographic that highlights data on both OCR's HIPAA audits and their enforcement activities in 2015 & 2016 recently released by Symantec 2016 Internet Security Threat Report.
CynergisTek can help your organization identify privacy program deficiencies, develop robust policies and procedures, and put into place qualified privacy staffing resources.
One of the most dreaded terms in the world of information technology and security (IT/IS) is “documentation”. Not because it isn’t massively helpful to everyone, or really for any reason other...
Read our checklist to learn criteria every healthcare delivery organization should consider when evaluating their medical device security program to effectively mitigate risks.