Cybersecurity Policy: how leaders set the expectation for cyber hygieneCybersecurity policy forms your staff behavior that protects your organization.Mar 22, 2022Mar 22, 2022
Medical Device Security: how leaders can secure medical devices to enhance patient safetyMedical devices are soft targets for threat actors.Mar 15, 2022Mar 15, 2022
Incident Response: how leaders can prepare for cyberattacksBeing prepared makes dealing with cyberattack incidents less stressful.Mar 8, 2022Mar 8, 2022
Published inSystem WeaknessVulnerability Management: how leaders can be proactive and ahead of attackersIt is safe to say that no system or software is 100% secure.Mar 1, 2022Mar 1, 2022
Network Management: how leaders can secure the network and minimize impact on attacksNetwork management is crucial to care delivery.Feb 22, 2022Feb 22, 2022
Asset Management: how leaders can improve patient safety by using IT assets that are “cyberworthy”From the perspective of cybersecurity in healthcare, asset management ensures that IT assets are safe to use to deliver care.Feb 15, 2022Feb 15, 2022
Data protection: how leaders can minimize information leakData protection is about keeping PHI, research data, or other sensitive information confidential. It is like having invisible fences for…Feb 8, 2022Feb 8, 2022
Access Management: how leaders can minimize disruption from cyber attacks — Health CyberlabAccess management affects whether your service line is disrupted for one day or three months when an attack happens.Feb 1, 2022Feb 1, 2022
Endpoint Protection: budget-friendly options for health leaders in 2022With trends like work from home, remote patient monitoring, acute care at home, new ambulatory care models, etc., the topic of endpoint…Jan 25, 2022Jan 25, 2022
Email Protection: How leaders can get cost-effective option in 2022A robust email protection system is crucial to stop email phishing attacks that often lead to ransomware. The Health Industry Cybersecurity…Jan 17, 2022Jan 17, 2022