- compliance
- Cybersecurity
- healthcare
- HIPAA
- ePHI
- protected health information
- security risk assessment
- Risk Analysis
- data breach
- HIPAA Privacy Rule
- hipaa security rule
- patient privacy
- security incident
- e-PHI
- risk analysis steps
- compliance
- Cybersecurity
- ransomware
- security risk assessment
- cybersecurity awareness
- CISA
- data backup
- security updates
- krebs security
- independence day
- American Freedoms
- freedom from cybercrime
- easy hacks
- known vulnerabilities
- CVE
- compliance
- Cybersecurity
- other
- cybercrimes in 2022
- war on Ukraine
- Russian hackers
- Red Cross hacked
- oil supply attacks
- LockBit
- Conti
- political cybercrimes
- cybercrime for profit
- PressReader hacked
- GiveSendGo hacked
- cryptocurrency stolen
- Block Inc hacked
- Cybersecurity
- nist cybersecurity framework
- other
- CMMC
- defense contractor
- CMMC audit
- dod
- CMMC Compliance
- preparing for CMMC 2.0
- CMMC 2.0 prepardness
- CMMC 2.0 compliance
- cyber security
- Cybersecurity
- healthcare
- HIPAA
- Privacy
- protected health information
- ransomware
- Security
- security assessment
- compliance
- Cybersecurity
- other
- FBI
- common cybercrimes
- business email compromise
- email account compromise
- cybercrime complaint center
- cost of cybercrime
- robocalls
- compliance
- Cybersecurity
- #cybersecurity awareness training
- risk assessment
- security assessment
- security risk assessment
- other
- security training
- teamwork
- software patches
- memorial day
- remembering
- compliance
- Cybersecurity
- healthcare
- HIPAA
- identity theft
- healthcare fraud
- healthcare cybercrime
- FBI investigations
- medical billing fraud
- medical fraud
- compliance
- Cybersecurity
- ransomware
- other
- spoofed email
- spoofed websites
- website spoofing
- email spoofing
- blackcat ransomware
- FBI cybercrime complaints
- FBI cybercrime alerts
- compliance
- Cybersecurity
- Payment Card Industry
- PCI DSS
- women in tech
- gender bias in tech
- women in payments
- women in tech statistics
- state of cybersecurity report
- security standards council
- ISACA cybersecurity report
- TrustRadius women in tech survey
July, 5 2022
For nearly a year, Lisa J. Pino has served as Director of the U.S. Department of Health and Human Services (HHS) Office[…]
June, 28 2022
Independence Day in America is a huge national event that we celebrate in many ways. Americans prize their freedoms[…]
June, 21 2022
The profit motive has long been a primary driver of cybercrime around the globe. However, when we reviewed some of the[…]
June, 14 2022
For businesses, suppliers, and contractors working with the Department of Defense, CMMC 2.0 is a contractual[…]
June, 7 2022
How often do we hear a provider say – “My priority is my patient, I don’t have time for other things”. Well, it is a[…]
May, 31 2022
There are a number of resources in the U.S. who collect data about cybercrime, and the FBI’s Internet Cybercrime[…]
May, 24 2022
As Memorial Day approaches, our thoughts turn to backyard barbeques, boating, and beer. Sunscreen on our noses, picnics[…]
May, 17 2022
Did you know that the FBI is the lead federal agency responsible for investigating cyberattacks? Their role includes[…]
May, 10 2022
The art of spoofing has been around since time immemorial, or so it seems. Spoofing can take a humorous form as a[…]
May, 3 2022
It wasn’t long ago that the first women began to enter the technology field, specifically in computer science and[…]
Content not found