Skip to content

Category: cybersecurity

Read the latest articles and news from the world of cybersecurity.

Benefits of Pen Testing for Radiology

Radiology organizations handle sensitive medical information and rely heavily on secure digital systems to store and transmit patient data. With the increasing prevalence of cyber threats, ranging from ransomware attacks
Read More

Pen Testing for Radiology

Penetration testing, often referred to as “pen testing” or “ethical hacking,” is a proactive security assessment approach used to identify vulnerabilities and weaknesses within a computer system, network, or application.
Read More

Pen Testing versus Vulnerability Assessment

Feeling confused about security assessments? Are you unsure if a Vulnerability Assessment or Penetration Test is the right assessment for your organization? While both aim to test your defenses and
Read More

Transition to ISO 27001:2022

The ISO 27001:2022 certification standard was released in October 2022. It has replaced the ISO 27001:2013 edition via a three-year transition period, which ends on October 31, 2025. Companies with
Read More

Cybersecurity Checklist for 2024

Cybersecurity is a critical concern for organizations in 2024 as the digital landscape continues to evolve and cyber threats become more sophisticated. Though organizations across industries have regulatory requirements related
Read More

How to Prevent the Impact of Ransomware

Verizon’s Data Breach Investigations Report found that 74% of all breaches were a result of human error due to social engineering. This statistic is based on the analysis of 16,312
Read More

Technologies To Detect And Prevent Ransomware Attacks

Verizon’s Data Breach Investigations Report puts the cost of 95% of security incidents at $1 million – $2.25 million dollars. The report is based on the analysis of 16,312 security
Read More

Can you have a Ransomware attack if you are HIPAA-compliant?

The short answer: Yes   The in-depth answer: The Health Insurance Portability and Accountability Act (HIPAA) sets the minimum standards for protecting sensitive patient health information (PHI). The Department of Health
Read More

Sources of Ransomware Attacks on Healthcare Systems

A cohort study published in The Journal of the American Medical Association in December of 2022 revealed that Ransomware attacks targeting Healthcare delivery organizations more than doubled from 2016 to
Read More

Protect your DICOM from Cyber Attacks

DICOM stands for Digital Imaging and Communications in Medicine. It is a standard protocol for managing, storing, and transferring medical images and related data in a digital format. It ensures
Read More