The search found 4155 results.
Blog
Two recently published reports discuss the high cost of healthcare data breaches organizations can incur. The Department of Health and Human Services estimates that it takes a breached healthcare organization a full year to recover.
Blog
The National Institute of Standards and Technology (NIST) has released a request for information for the NIST Privacy Framework: An Enterprise Risk Management Tool ("Privacy Framework").1 The purpose of the privacy framework is to improve management of privacy risk, which is a major gap across healthcare organizations today.
Blog
Often when discussing common healthcare security threats, external breaches are the main focus. However, recent evidence shows those breaches are not the biggest concern to hospitals – they’re more concerned with breaches that can happen within their own halls, by their own internal staff. HIMSS Media recently conducted a study on behalf of SailPoint, and the consensus was that healthcare provider organizations are highly concerned with insider threats.
Blog
A recent ProPublica article highlighted how small-scale medical privacy breaches are causing harm across the nation. The impact of small-scale breaches is immense, but seems to garner comparatively little coverage as most data breach headlines focus on large-scale breaches involving hundreds if not thousands of medical records.
Blog
Gartner, Inc. recently released their “Market Guide for User and Entity Behavior Analytics”. Gartner provides an interesting take on a very hot topic in the security space across all industries in the modern day.
Blog
The cyberattack on Colonial Pipeline Co. and similar recent attacks such as the SolarWinds breach (which impacted several government agencies) revealed major vulnerabilities in government cybersecurity protocols and critical infrastructure systems, resulting in immediate action to be taken by the White House.
Blog
Remote access and connecting into customers' networks are often overlooked vectors of risk. As a value-added reseller (VAR), your company alone may provide any or all of these connections to your customers:
Blog
If you have any involvement with government entities and operations, chances are you’ve heard of CJIS compliance. It’s the largest division of the FBI and the primary source of information and services for all law enforcement, national security, and intelligence community partners.
Blog
“We had a large manufacturing company come to us looking to solve their third-party access problem after discovering a virus within their OT environment,” says Rob Palermo, VP of Product Management at SecureLink. “One of the first steps they took was to disable VPNs being used by third parties.
Blog
Stolen or compromised credentials are often responsible for damaging hacks. Learn how compromised passwords can lead to data breaches. Read the blog.