Blog

We know you have a lot of questions. That’s why our team has curated top-notch resources to help you along your healthcare cybersecurity and compliance journey.

Risks for Healthcare Organizations that can Expose Active Directory Accounts

Risks for Healthcare Organizations that can Expose Active Directory Accounts

Author: Fabian Crespo, Consultant, Technical Testing Microsoft Active Directory (AD) (Azure Active ...
Scanning for Trouble: The Hidden Dangers of QR Code ’Quishing’ Attacks 

Scanning for Trouble: The Hidden Dangers of QR Code ’Quishing’ Attacks 

Author: Tyler L. Jones, MSIT, CEH, PJMR, CCTHP, ASV | Clearwater Sr. Cybersecurity Analyst, Incident Response ...
Industry at Risk: Reconsidering the One-Size-Fits-All Approach to Healthcare Risk Analysis

Industry at Risk: Reconsidering the One-Size-Fits-All Approach to Healthcare Risk Analysis

For over a decade, the HIPAA Security Rule has required covered entities and business associates to engage in risk ...
Cyber Briefing | October 2023

Cyber Briefing | October 2023

We're here to make sure you stay in the know about the latest in cybersecurity and healthcare trends. Our goal is ...
Collaboration is the Key to Driving Strong Healthcare Governance Programs

Collaboration is the Key to Driving Strong Healthcare Governance Programs

It’s a common scenario—someone on your IT, compliance, or security team discovers a problem. It might be lost ...
Cloud Risk is Different than Traditional IT Risk—Here’s What to Do About It

Cloud Risk is Different than Traditional IT Risk—Here’s What to Do About It

Cloud solutions have quickly become the preferred choice for healthcare organizations seeking easier and faster ...
7 Ways to Ensure Your Incident Response Plan Is Incident-Ready

7 Ways to Ensure Your Incident Response Plan Is Incident-Ready

It’s 4:45 p.m. on a Friday. You’ve had a great week. You’re busy shutting down all your equipment and are ready to head home when a colleague peeks into your office.
How a Security Controls Validation Assessment Optimizes Cybersecurity Investments

How a Security Controls Validation Assessment Optimizes Cybersecurity Investments

Healthcare organizations invest billions of dollars in security solutions to safeguard sensitive patient data—but ...
CMMC 2.0 Compliance is Around the Corner: Is Healthcare Ready?

CMMC 2.0 Compliance is Around the Corner: Is Healthcare Ready?

More than 15 years ago, through a supply chain attack against a U.S. Department of Defense (DoD) contractor, ...
Privacy Investigations and User Access Monitoring: 5 Things Healthcare Leaders May Not Be Thinking About

Privacy Investigations and User Access Monitoring: 5 Things Healthcare Leaders May Not Be Thinking About

User access monitoring is a critical component of a healthcare cybersecurity strategy, serving as a digital sentry ...
Changes are Coming for the NIST Cybersecurity Framework: What Do They Mean for Healthcare and How Can You Prepare for Compliance?

Changes are Coming for the NIST Cybersecurity Framework: What Do They Mean for Healthcare and How Can You Prepare for Compliance?

For nearly a decade, the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF)has ...
Fortifying At-Home Wellness Screenings: Reperio Health Teams Up with Clearwater to Safeguard Security

Fortifying At-Home Wellness Screenings: Reperio Health Teams Up with Clearwater to Safeguard Security

Building Trust to Scale a Startup “We need to be ready with clear answers about the security of our platform so ...

Newsletter

Sign up for our monthly newsletter discussing hot topics and access to invaluable resources.


Featured Resource