by Julie Catron | Nov 17, 2023 | Blog
Driven largely by an ongoing increase in ransomware attacks and payouts, cyber insurance carriers today require more stringent controls to get—and keep—coverage. What was once just a few questions are now applications and questionnaires that span many pages. And,...
by Julie Catron | Nov 13, 2023 | Blog
An AI Risk Management Framework Can Decrease Risks While Accelerating Adoption Healthcare organizations are rushing to adopt artificial intelligence (AI), and it’s rapidly transforming the industry. From improving patient care to streamlining administrative tasks, AI...
by Fabian Crespo | Nov 8, 2023 | Blog
Author: Fabian Crespo, Consultant, Technical Testing Microsoft Active Directory (AD) (Azure Active Directory has been renamed to Microsoft Entra ID) is an attractive target for cyber attackers because it is central to an organization’s IT infrastructure, providing...
by Julie Catron | Nov 3, 2023 | Blog
Author: Tyler L. Jones, MSIT, CEH, PJMR, CCTHP, ASV | Clearwater Sr. Cybersecurity Analyst, Incident Response & Threat Intelligence The QR Code Revolution Promise In the last ten years, the digital world has seen a seismic transformation in how we share and...
by Jon Moore | Oct 30, 2023 | Blog
For over a decade, the HIPAA Security Rule has required covered entities and business associates to engage in risk analysis and management. This mandate serves the critical purpose of safeguarding patient safety and ensuring the confidentiality, integrity, and...
by Julie Catron | Oct 6, 2023 | Blog
It’s a common scenario—someone on your IT, compliance, or security team discovers a problem. It might be lost equipment, a potential breach, or a compliance violation. Team members immediately discuss it, looking for ways to resolve the problem quickly. Yet, they...