by Julie Catron | Aug 15, 2023 | Blog
User access monitoring is a critical component of a healthcare cybersecurity strategy, serving as a digital sentry guarding the gates to patient data and proprietary information. As the healthcare sector becomes increasingly interconnected, the potential risks...
by Julie Catron | Aug 10, 2023 | Blog
For nearly a decade, the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF)has been the gold standard for developing and managing cybersecurity programs, and as the threat landscape evolves and becomes increasingly complex, the...
by Julie Catron | Jul 18, 2023 | Blog
If HHS’s 405(d) Health Industry Cybersecurity Practices (HICP) guidelines have been on your organization’s radar or already implemented in your organization, you likely know that updates were recently released for 2023 that reflect changes in healthcare risks and...
by Julie Catron | Jul 13, 2023 | Blog
Healthcare service providers often find themselves needing to provide third-party validation that they have the right level of security in place and are managing cyber risk appropriately. Depending on the type of business, a SOC 2 audit or HITRUST Certification is...