Staying HIPAA Compliant While Leveraging Telehealth
by Patrick Hughes on March 13, 2024 at 3:00 PM
In the rapidly evolving landscape of healthcare, telehealth has emerged as a pivotal technology, offering unprecedented convenience and accessibility to patients and providers alike. However, as healthcare organizations increasingly adopt these digital health services, the imperative …
NIST Cybersecurity Framework 2.0 – Key Takeaways
by Derek Boczenowski on March 7, 2024 at 1:30 PM
Last week, the National Institute of Standards and Technology (NIST) unveiled the second version of its Cybersecurity Framework (CSF), marking the first major new updates to NIST CSF since the framework's inception ten years ago. Initiated by Executive Order 13636, the development of …
Multi-Factor Authorization (MFA) During Cellular Network Outage
by Peter Fellini on February 28, 2024 at 4:15 PM
Multi-factor authentication (MFA) stands as a crucial safeguard in thwarting unauthorized access to accounts. Traditionally, one of the most widespread practices has been the use of a mobile device as a key component in this security measure. Users typically receive a one-time passwor …
How to Identify Phishing & Online Security Breach Attempts
by William DePalma on February 26, 2024 at 2:00 PM
In today's digital era, cybercrime is escalating at an alarming rate. Numerous studies indicate a continued upward trend in these incidents. Alarmingly, millions fall victim annually, often unaware of the breach.
2FA vs. MFA: What's the Difference?
by Geoff Yeagley on February 16, 2024 at 11:30 AM
Logging into your online accounts, a process known as "authentication," is essentially confirming your identity to the service provider. In the past, this was typically done using a username and password. However, this method proved to have its flaws.
Understanding AI-Powered Social Engineering Attacks
by Jesse Roberts on February 13, 2024 at 4:45 PM
Social engineering manipulates people into revealing sensitive information or granting access to systems. Traditionally, it has involved phishing emails or impersonating authority figures. Today, artificial intelligence (AI) is taking social engineering to a new level. AI attackers ca …