Is a longer password better than a complex one?
Is a longer password better than a complex one?
YES!! Longer passwords are better.
Protecting medical devices to build cyber resilience
Protecting medical devices to build cyber resilience
The digitization of healthcare has allowed healthcare organizations to utilize robust technology such as medical devices to help improve both patient care an
Imprivata Joins CommonWell Health Alliance to Promote Interoperability
Imprivata Joins CommonWell Health Alliance to Promote Interoperability
Earlier this week, we announced our new membership in CommonWell Health Alliance, a leading organization ded
Bipartisan legislation in U.S. Congress requires e-prescribing to combat opioid abuse
Bipartisan legislation in U.S. Congress requires e-prescribing to combat opioid abuse
On July 28, federal legislators introduced HR 3528, The Every Prescription Conve
Compare RDP vs VNC in simple language
Compare RDP vs VNC in simple language
 RDP or VNC AccessA friend recently asked me to explain the difference between RDP and VNC protocol to remotely access a computer.
Community Hospital Anderson Ensures Positive Patient Identification
Community Hospital Anderson Ensures Positive Patient Identification
Community Hospital Anderson, a part of Indiana’s Community Health Network, believes that positive
4-Methods
Four methods to access cloud computers securely
 Networks in the cloudIt is easy to start a virtual computer these days in a cloud datacenter managed by Amazon AWS or Microsoft Azure
Preparing for cyberattacks: building a resilient infrastructure
Preparing for cyberattacks: building a resilient infrastructure
As history shows, global ransomware attacks have been part of the new reality for quite some time.
Roaming quickly and securely at Cumberland Healthcare
Roaming quickly and securely at Cumberland Healthcare
I recently sat down with Jason Morse, Director of Information Technology at Cumberland Healthcare (Cumberland Memorial Hospital), a 25-bed facility in Cumber
Connecticut the Fourth State to Mandate E-Prescribing to Combat Opioid Abuse
Connecticut the Fourth State to Mandate E-Prescribing to Combat Opioid Abuse
Connecticut lawmakers recently passed legislation that requires electronic prescribing of opioid medication, further validating the significant role technolo
Five reasons single-password authentication should be banned
Five reasons single-password authentication should be banned
With the rapidly growing number of sophisticated cyber-attacks, such as phishing and ransomware, single-factor authentication has had its day. One way to fight back against the rise in cyber-attacks is by using strong multi-factor authentication.
Four tips on implementing 2FA policies
Four tips on implementing 2FA policies
If you’re still authenticating remote users with a single password, it’s time to make a change. There’s just too much at stake. With that in mind, here are four things to keep in mind when considering a two-factor authentication policy for your organization - and one thing you should probably avoid.
The Report on Improving Cybersecurity in the Health Care Industry – where and how to start updating your cybersecurity strategy
The Report on Improving Cybersecurity in the Health Care Industry – where and how to start updating your cybersecurity strategy
On Friday, June 2nd, the U.S.
Three considerations when implementing two-factor authentication
Three considerations when implementing two-factor authentication
Healthcare organizations are under constant attack from cyber threats.
Patches aren’t the silver bullet; hospitals can keep systems running when hit by ransomware attacks
Patches aren’t the silver bullet; hospitals can keep systems running when hit by ransomware attacks
As news of the
Is your casino network under attack?
Is your casino network under attack?
See how to streamline your security methods and ensure your gaming business doesn’t suffer a hacking incident. This article covers recent casino data breaches and reveals how to prevent cybercriminals from accessing sensitive, confidential data on your network.
Five security questions your law firm should ask
Five security questions your law firm should ask
Law firms are appealing targets for cybercriminals. Home to a multitude of sensitive, personal, confidential, financial information, what better place to attack in order to steal some juicy data? There’s certainly a few questions that should be on your security radar, let’s address them in this blog.
Government funding bill includes huge step forward for patient identification
Government funding bill includes huge step forward for patient identification
Congress recently passed a spending bi
Hospitality: Stopping third-party breaches
Hospitality: Stopping third-party breaches
The more technology advances, the more this creates potential security issues for the hospitality world. Learn ways you can protect your hotel from costly cybercrimes, hacking attacks, and reputational damage.
How Gundersen Health System is securing its EMR without impacting clinical access
How Gundersen Health System is securing its EMR without impacting clinical access
As electronic medical records play an increasingly central role in all aspects of healthcare, many organizations struggle with how to make their EMRs more se