Controls-based “checklists” and dubious certifications will not adequately protect a healthcare organization’s sensitive digital assets – www.us.hitleaders.news
The agency says threat actors are targeting organizations' IT help desks with phone calls from a local area code claiming to be revenue cycle or administrator employees. After gaining access, they divert legitimate payments.