In this blog we discuss when you can text patients, what the regulations are, and the appropriate reasons and times for texting. We will also be discussing the advantages of using a texting service.
Organizations should identify the roles assigned to each statement within the policy. Mapping policy commitments to requirements and roles creates a shared responsibility matrix.
In this blog we explore exactly what spam is, and how it compares to other forms of malware. Specifically, how it compares to phishing, as the two methods of social engineering are so similar.
Here are a few phishing email examples and tactics that came straight out of our own inboxes. Luckily, none of these examples led to a breach or malicious attack.
When evaluating the current state of your cybersecurity environment, healthcare companies need to ask themselves specific questions to evaluate themselves.
As healthcare practices scramble to protect their cybersecurity, some have already faced their worst nightmare. Here’s our massive list of the most devastating healthcare ransomware attacks in 2019.
Implanted medical devices are objects fixed into the body to assist with function. They often lack adequate security because their wireless antennas don’t encrypt data. This increases the likelihood of a hack.