by Fabian Crespo | Nov 8, 2023 | Blog
Author: Fabian Crespo, Consultant, Technical Testing Microsoft Active Directory (AD) (Azure Active Directory has been renamed to Microsoft Entra ID) is an attractive target for cyber attackers because it is central to an organization’s IT infrastructure, providing...
by Julie Catron | Nov 3, 2023 | Blog
Author: Tyler L. Jones, MSIT, CEH, PJMR, CCTHP, ASV | Clearwater Sr. Cybersecurity Analyst, Incident Response & Threat Intelligence The QR Code Revolution Promise In the last ten years, the digital world has seen a seismic transformation in how we share and...
by Jon Moore | Oct 30, 2023 | Blog
For over a decade, the HIPAA Security Rule has required covered entities and business associates to engage in risk analysis and management. This mandate serves the critical purpose of safeguarding patient safety and ensuring the confidentiality, integrity, and...
by Julie Catron | Oct 6, 2023 | Blog
It’s a common scenario—someone on your IT, compliance, or security team discovers a problem. It might be lost equipment, a potential breach, or a compliance violation. Team members immediately discuss it, looking for ways to resolve the problem quickly. Yet, they...
by Julie Catron | Sep 8, 2023 | Blog
Cloud solutions have quickly become the preferred choice for healthcare organizations seeking easier and faster implementation, flexibility, and cost savings. By 2025, Gartner estimates that more than 95% of new digital workloads will be on cloud-native platforms;...
by Dawn Morgenstern | Sep 7, 2023 | Blog
It’s 4:45 p.m. on a Friday. You’ve had a great week. You’re busy shutting down all your equipment and are ready to head home when a colleague peeks into your office. There’s a problem with one of your core systems. None of the end-of-week patient billing statements...