<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">

24By7Security Blog

Subscribe to our Blog!

Secure Mobile Messaging in Healthcare: 4 Recommendations to Remain HIPAA Compliant

A research study, the State of Clinical Communication and Workflow in healthcare organizations, revealed that 51% of IT[…]

9 Critical Cybersecurity Metrics Every Business Should Know

It’s often said that you can’t manage what you can’t measure.

The future of the Internet of Bodies - and its security and privacy implications

What are the security and privacy challenges when data resides in and emanates from our own bodies?

How to Protect Your Business From Password Spraying

There’s a simple, successful tactic that many cybercriminals use to hack into your confidential information: password[…]

HIPAA Privacy Rules, Mental Health, and Addiction: When can PHI be shared without consent?

HIPAA is designed to protect patient confidentiality. What happens when patient confidentiality conflicts with a[…]

What to Include in Your Incident Response Plan

Cybersecurity data breaches have almost become a way of life. We hear about businesses impacted by security incidents[…]

How to be HIPAA compliant on social media

Social media can be a minefield for any business to navigate. When it comes to the combination of patient privacy and[…]

OCR Priorities for 2019-2020

In the recent HIPAA conference organized by the Office of Civil Rights (OCR) and National Institute of Standards and[…]

How a cyber range helps IT security teams in getting ready for a cyber attack

Imagine a team of IT security professionals connecting to a simulated security environment, when suddenly one of them[…]

6 Communication Tips to Regain Patient Trust After a Medical Record Breach

Even with a perfect cybersecurity strategy and implementation, including performing all required steps to be HIPAA[…]