In this blog we discuss when you can text patients, what the regulations are, and the appropriate reasons and times for texting. We will also be discussing the advantages of using a texting service.
Organizations should identify the roles assigned to each statement within the policy. Mapping policy commitments to requirements and roles creates a shared responsibility matrix.
In this blog we explore exactly what spam is, and how it compares to other forms of malware. Specifically, how it compares to phishing, as the two methods of social engineering are so similar.
Ransomware is one of the newest, most trendy types of cyber attacks that hackers rely on to trick companies into paying them money. Here’s how to avoid them yourself.
To help convince you that every organization should develop a cybersecurity plan, here are 93 statistics on ransomware that showcase the reality of the devastating effects of ransomware.
Ransomware attacks happen all of the time. Because of their consequences, your team must know what these cyberattacks are and how to prevent them. If you don’t know how to ensure this, don’t worry. One of the easiest ways to educate staff is by sending ransomware awareness emails.
What should your organization do if you fall victim to a ransomware attack? Well, it all depends on your incident response plan that you should have in place.
As healthcare practices scramble to protect their cybersecurity, some have already faced their worst nightmare. Here’s our massive list of the most devastating healthcare ransomware attacks in 2019.