Why Killware Is Something To Be Concerned About Now

Malware. Ransomware. As if there wasn’t enough to plan for as you develop your security strategy, this week brings to attention another threat called killware. In a USA Today interview, Homeland Security Secretary Alejandro Mayorkas revealed that hackers breached a ...

Managing and Securing Your 5G Network

5G is coming. And it’s coming fast. Right now, carriers are giving deals to help people switch from older platforms. If you’ve been using 4G, you’ll instantly notice speed, coverage, and reliability improvements. That’s reason enough to change. 5G uses ...

Part Time Support, Full Time Technological Success

As a healthcare provider, you have a full array of activities to fill your days. Seeing patients Consulting with peers Interacting with employees Handling daily tasks Dealing with immediate problems Staying up to date with guidelines and regulations Have you ...

5 Most Common HIPAA Violations Healthcare Providers Face Regularly

As a medical provider, how often do you think about the impact of HIPAA on your standard policies and procedures? Are you handling protected health information according to guidelines? Or are you putting data and information in compromising situations daily? ...

Why Implantable Medical Devices Are Easily Hacked

It’s hard to imagine healthcare without technology. It exists in every aspect, from signing up patients on a website to tracking personal data using wearable technology. We use it to virtually connect with patients and experts, and help control medications ...

Patients Think You’re a High Security Risk If Your Practice’s Website Is Out Of Date

It’s hard to imagine being in business these days without a website. Web design trends change quickly, and if you’re not staying on top of critical changes, it may be costing you more than you think. While a great website ...

Getting The Balance Right Between Security, Governance, Healthcare, and Usability 

One laptop is stolen every 53 seconds. Seventy million smartphones are lost each year, with only 7 percent recovered. The statistics are scary, yet most of us hang to the “not us” belief as we go about our busy days. ...

Telehealth Increases Security Risks - Here’s How To Secure It

2020 was a year of rapid growth for telehealth. Desire for the technology happened so fast, many healthcare organizations jumped on board with various video conferencing and messaging apps without really thinking about the consequences. And that left vulnerabilities. According ...

Think You’re Secure? Why Apps Put You More At Risk and What You Can Do

It’s easy to do. You’re bored. You head over to the app store and browse. You find something that looks interesting, download it, and start using it. Rinse. Repeat. Until your phone is filled with a variety of applications you ...

Managing Privileges To Ensure Everyone Has Access To What They Need

Privilege. It’s defined as: a special right or advantage granted or available only to a particular individual or group. In an information technology context, privilege is the authority granted to an account or process within a system or network. Privilege ...