The DDoS Defense: Guidelines for Healthcare Security

The DDoS Defense: Guidelines for Healthcare Security

by Nathan Gellatly | Jun 11, 2024 | Blog Posts

The U.S. Department of Health and Human Services (HHS) released a new guide to help protect against Distributed Denial-of-Service (DDoS) attacks. These increasingly sophisticated assaults pose a significant threat to the healthcare sector, where uninterrupted access...
The Fallout of Ascension Cyber Attack: What You Need to Know

The Fallout of Ascension Cyber Attack: What You Need to Know

by Nathan Gellatly | May 27, 2024 | Blog Posts

The latest cyber threat to hit the healthcare sector has severely impacted Ascension, one of the largest healthcare associations. It began with unauthorized access to their systems, leading to widespread disruptions.  As healthcare providers work to restore...
What You Need to Know from Verizon’s 2024 Data Breach Report

What You Need to Know from Verizon’s 2024 Data Breach Report

by Nathan Gellatly | May 13, 2024 | Blog Posts

Verizon recently released their annual Data Breach Investigations Report (DBIR). The 2024 report analyzes over 30,000 security incidents (over double from last year), giving us a clear picture into the threats and vulnerabilities facing organizations today.  The...
Cybersecurity is Your Best Financial Strategy Now

Cybersecurity is Your Best Financial Strategy Now

by Nathan Gellatly | Apr 15, 2024 | Blog Posts

Cybersecurity is becoming more than just risk management. It’s a smart investment that boosts both security and financial health. With the recent breaches and increasing breaches and incidents, it’s more apparent than ever that security is a necessity in the...
AI in Healthcare: Three Ways to Get Started 

AI in Healthcare: Three Ways to Get Started 

by Nathan Gellatly | Apr 1, 2024 | Blog Posts

Revolutionize Patient Scheduling with AI In the realm of healthcare, AI is not just about streamlining processes; it’s about enhancing the human element. AI technologies enable personalized patient communication, tailoring interactions based on individual...
« Older Entries
Next Entries »

Recent Posts


  • Your Incident Response Plan: How to Build it the Right Way (and the Wrong Way)
  • Stay Secure During Cybersecurity Awareness Month
  • Insider Threats: Managing the Risks Within Your Organization
  • Healthcare Cybersecurity Needs: Zero Trust
  • How To Identify Phishing Scams Immediately

Categories


  • Blog Posts
  • Checklists
  • Guides
  • Press Releases
  • Uncategorized
Copyright 2023 Medcurity. All Rights Reserved
  • Security Risk Analysis
  • Policies & Procedures
  • Business Associate Agreements
  • HIPAA Training
  • HIPAA Resources
  • About Us
  • Contact Us
  • Register
  • Login