In this blog, we will discuss what a long-term care facility is and how they bill their patients. We will also talk about the main steps that occur when the billing process starts, and common challenges faced.
Here are a few phishing email examples and tactics that came straight out of our own inboxes. Luckily, none of these examples led to a breach or malicious attack.
When evaluating the current state of your cybersecurity environment, healthcare companies need to ask themselves specific questions to evaluate themselves.
As healthcare practices scramble to protect their cybersecurity, some have already faced their worst nightmare. Here’s our massive list of the most devastating healthcare ransomware attacks in 2019.
Implanted medical devices are objects fixed into the body to assist with function. They often lack adequate security because their wireless antennas don’t encrypt data. This increases the likelihood of a hack.
We spoke with Chris Wiser, a former executive MSP, and current marketing agency CEO, about his proven method for executing a synergized marketing and sales strategy for cybersecurity that will fill up your pipeline.
We had the opportunity to sit down with the Vice President and General Manager at Collabrance to discuss what keeps the average cybersecurity MSP up at night, industry trends and Collabrance’s latest offering.