by Kim Singletary | Oct 29, 2025 | Expert Advice
If I could share one cybersecurity tip it would be to establish strong relationships and channels of communication with vendors, including SaaS/application vendors, hardware and medical device vendors, and service providers. Maintaining open communication with vendors...
by Kim Singletary | Oct 29, 2025 | Expert Advice
Defense in depth is a strategic cybersecurity approach that healthcare organizations should adopt to protect electronic protected health information (ePHI). The fastest way to create weakness in your cybersecurity posture is by failing to implement this layered...
by Kim Singletary | Oct 29, 2025 | Expert Advice
On the heels of a Risk Analysis, I have seen many organizations get overwhelmed by the large lists of items to remediate. Sometimes the risks with the highest priorities also carry daunting financial or implementation requirements that will cause delay. Don’t let a...
by Kim Singletary | Oct 29, 2025 | Expert Advice
Enabling MFA is a strong start but true protection comes from how it is implemented, managed, and monitored. The reason this matters is simple: too many organizations assume MFA equals instant security. I’ve seen teams roll it out company-wide using weak or...
by Kim Singletary | Oct 24, 2025 | Expert Advice
Security during mergers, acquisitions, and rapid growth is often overlooked, yet it’s one of the most vulnerable times for healthcare organizations. If I could share one tip, it would be to build a security playbook before the deal, not after. This has the potential...
by Kim Singletary | Oct 24, 2025 | Expert Advice
Do you know what it costs your organization for one day of downtime to critical operations? Do you know what your essential third-party vendors are contracted to provide during unplanned outages? Qualifying potential threats and incidents is crucial to every...