- ransomware
- risk assessment
- security risk assessment
- DontRiskItSecureIt
- Risk Analysis
- malware
- phishing
- social engineering
- compliance
- Health IT
- healthcare
- Healthcare IT
- HIPAA
- HIPAA compliance
- HIPAA Risk Assessment
- ePHI
- PHI
- protected health information
- ransomware
- Security
- security assessment
- cyber hygiene
- cyber security
- Cybersecurity
- #piday
- ransomware
- Security
- compliance
- cyber extortion
- cyber insurance
- cyber insurance coverage
- cyber liability
- cyber policy
- #CyberAware
- Cybersecurity
- Data privacy
- enforcement
- healthcare
- ransomware
- risk mitigation
- Security
- security strategy
- CISO
- cyber security
- #CyberAware
- Cybersecurity
- ransomware
- Security
- security assessment
- benefits of network segmentation
- Cybersecurity
- network segmentation
- petya
- ransomware
- ransomworms
- Security
- segment your network
- wannacry
- compliance
- #CyberAware
- encryption
- enforcement
- healthcare
- HIPAA
- HIPAA compliance
- ePHI
- news
- OCR
- PHI
- ransomware
- backup
- cyber hygiene
- #CyberAware
- Cybersecurity
- incident response
- lessons learnt
- hackers
- news
- offline backup
- patch
- protection
- ransomware
- Security
- security risk assessment
- wanna cry
- Data privacy
- doctors
- healthcare
- HIPAA
- HIPAA Risk Assessment
- incident response
- ransomware
- Security
- #CyberAware
- Cybersecurity
- encryption
- Health IT
- healthcare
- Healthcare IT
- information security
- news
- ransomware
- Security
- security assessment
- 24By7Security
- Aarohi Talati
- Akash Deo
- Akhil Deo
- Amanda Spence
- Andrea Richard
- Anirudh Nadkarni
- Arjun Talati
- Benjamin Stukes
- Brian Gomez
- David Jost
- Deepali Shah
- Gabrielle Grau
- Gail Blount
- Kelly Alvarez
- Martin Palencia
- Michael Brown
- Nitin Chowdhry
- Parita Patel
- Prakul Neupane
- Randy Rodriguez
- Rema Deo
- Rupal Talati, HCISPP
- Sanjay Deo
- Yashica Nagpal
August, 28 2018
Eight tips for an effective phishing test at your organization You have provided security training to your employees.[…]
March, 30 2018
Welcome to Part II of this series regarding the HIPAA Security rule. As a reminder, the HIPAA Security Rule is broken[…]
March, 14 2018
Pi Day is Cybersecurity Day. Why? Because EVERY DAY is Cybersecurity Day. Cyber crime has become so pervasive that not[…]
February, 22 2018
Cyber insurance is a hot topic these days. Many healthcare organizations are adopting the use of electronic systems[…]
January, 26 2018
In the first 2 weeks of 2018, a hospital in Indiana was hacked and held for ransom. According to Health IT Security[…]
July, 2 2017
Network Segmentation is the act of dividing one network into several pieces or sub-networks. In just the last few[…]
May, 24 2017
Iliana Peters recently provided a thorough update of HIPAA enforcement trends as well as a road map to OCR’s current[…]
May, 17 2017
Ransomware infections like WannaCry will come and go, but our job as Cyber Security professionals is to narrow down how[…]
July, 28 2016
Why do doctors and hospitals need an incident response plan? You’ve been breached. Now what? Perhaps valuable patient[…]
March, 1 2016
The world of cyber threats just got even more serious. Forget about corporate espionage just being the stuff of movies,[…]
No More Posts