healthcare cybersecurity frameworks

Cybersecurity Frameworks in Healthcare (And How to Adopt Them)

Just like any other industry, healthcare must be ready to handle cybersecurity threats.

What’s more, clinics and hospitals have to prove over and over again – the devices, technologies, and methods they use don’t bring any risk to patients. 

To do that, healthcare institutions start compiling their security with recognized standards and frameworks like NIST or HITRUST. 

But what exactly is a security framework? Which one should you use? What’s the right way to implement it?

continuous monitoring

Third CISO Roundtable Overview – Building a Defendable Enterprise with Continuous Monitoring

It was our third CISO roundtable that we hosted at a local vineyard and the conversation was as lively as ever. I’m not sure if it was the wine tasting, the food or the experience of the CISO’s in attendance, but this event was lively discussion that focused on “Building a Defendable Enterprise with Continuous Monitoring”. The excitement and passion that was coming back from our attendees was nothing short of encouraging to see how these leaders in our field are taking their roles serious in defending their organizations. It was once again a privilege to be in the midst of these leaders learning from their wisdom and experience in the field. This blog is being written as recap of a few highlighted discussion points throughout evening that were discussed.

regulations

7 Cyber Regulations Your Business Don’t Prepare For (But Should Be)

The last five years have been monumental for cybersecurity. Between data breaches that have affected the world’s biggest corporations and new laws passed worldwide to ensure better data security, the increased focus on securing data is a welcome one.

However, the number of cybersecurity threats is going. According to a UK-based firm, Hiscox, 50% of surveyed firms experiences an attack, up from 40% over the same period during the past year.

threat hunting

Threat Hunting Strategies for 2020

Cyber attacks are becoming more advanced with each year, as indicated by the increase in data breaches. According to a Risk-Based Security report, 2019 might break a new record, with more than 3,800 breaches, and still counting. 

Threat hunting aims to help reduce the number of breaches. Some security analysts even take threat hunting as far as infiltrating the dark web, all to ensure they are the first to discover a new attack type. Read on for an overview of the state of cybersecurity, and key threat hunting tips for 2020. 

pen test

Pen Test vs. Vulnerability Assessment: Which is Right for my Organization?

Often, when speaking to many organizations, I often hear confusion about Pen Testing, ie: what it is, how it differs from vulnerability assessments and what are the best use cases. I’ve decided to write this blog in the hopes of helping my customers better understand these differences and use cases of each.

The cyber threat environment is dynamic and constantly evolving. There are new vulnerabilities discovered on a daily basis. Attacks are getting more sophisticated – they’re getting more complex and flying under the radar of traditional detection technologies.

law firms

Legally Dangerous Attackers

Malicious actors are consistently and persistently looking for new avenues to compromise sensitive data and they’ve found one such entry through legal firms.

Legal firms play a unique role within the economy by being at the center of personal and business-related transactions. Legal firms are involved with large enterprises, governments, small businesses and individual cases. The data maintained by legal firms is both sensitive and valuable and attackers have taken notice. Legal firms are under a barrage of attacks due to the data and relationships they maintain. Many of these firms are focusing on user endpoints when it comes to reducing their risk.

social media

7 Ways Social Media Sabotages Your Cybersecurity

Social media can do wonders for you as an individual, as well as if you are running your own online business. It can help you build a loyal following, spread word and awareness about your brand, and reach out to other like-minded people, as well as customers. And the best about it is that it’s incredibly easy to do, since everyone you are looking for is already there. It is estimated that there will about 2.77 billion users on social media in 2019!

However, because the power of social media is so easy to utilize, most people let their guard down when it comes to cybersecurity, which can come back to haunt them at some point in the future, in a number of different ways. In order to avoid that, let’s take a look at seven ways in which social media sites sabotage your cybersecurity.