by Julie Catron | Oct 6, 2023 | Blog
It’s a common scenario—someone on your IT, compliance, or security team discovers a problem. It might be lost equipment, a potential breach, or a compliance violation. Team members immediately discuss it, looking for ways to resolve the problem quickly. Yet, they...
by Julie Catron | Sep 8, 2023 | Blog
Cloud solutions have quickly become the preferred choice for healthcare organizations seeking easier and faster implementation, flexibility, and cost savings. By 2025, Gartner estimates that more than 95% of new digital workloads will be on cloud-native platforms;...
by Dawn Morgenstern | Sep 7, 2023 | Blog
It’s 4:45 p.m. on a Friday. You’ve had a great week. You’re busy shutting down all your equipment and are ready to head home when a colleague peeks into your office. There’s a problem with one of your core systems. None of the end-of-week patient billing statements...
by Julie Catron | Sep 1, 2023 | Blog
Healthcare organizations invest billions of dollars in security solutions to safeguard sensitive patient data—but are those solutions working as intended? A 2020 report by Cybersecurity Ventures predicted that the healthcare industry will spend $125 billion...
by Julie Catron | Aug 28, 2023 | Blog
More than 15 years ago, through a supply chain attack against a U.S. Department of Defense (DoD) contractor, Chinese hackers breached the Pentagon’s Joint Strike Fighter project and stole data about the U.S. F-35 fighter jet. They used the data to build their own...
by Julie Catron | Aug 15, 2023 | Blog
User access monitoring is a critical component of a healthcare cybersecurity strategy, serving as a digital sentry guarding the gates to patient data and proprietary information. As the healthcare sector becomes increasingly interconnected, the potential risks...