Blog Listing

How critical access management protects three industries from cyber threats
How critical access management protects three industries from cyber threats
Despite large financial and time-intensive investments into access management tools and cybersecurity solutions, a business’ critical assets still remain vulnerable and prone to attack.
rushed-inside-hospital
Clinicians on the move: Is there more to the healthcare exodus than COVID-19?
It’s time to consolidate and automate identity governance. See 10 reasons why.
How critical access management protects government entities from cyber threats
How critical access management protects government entities from cyber threats
Every 11 seconds, a company falls victim to a ransomware attack. Compromised protected personal data resulted in 1.8 HIPAA privacy violations per day in 2020. The cost of cyber attacks globally in 2021, according to Cybersecurity Ventures, is expected to cost $20 billion.
How to define critical access: Frequency, risk, and urgency
How to define critical access: Frequency, risk, and urgency
Understanding critical information, critical access points, and how to best employ critical access management begins with three key aspects: frequency, risk, and urgency.
Defining the different types of insider threats
Defining the different types of insider threats
As technology continues to evolve, cyberattacks are becoming more sophisticated. Many organizations focus their cybersecurity efforts only on outsider threats, hence creating more loopholes for insider threats. These companies don’t see the possibility of losing sensitive data due to negligence or the malicious intent of their own people.
killerware_photo
From ransomware to killware: Is the future of cyberattacks turning more sinister?
HDOs have witnessed ransomware’s danger to patient health for years. But is killware the next big threat?
What is access monitoring?
What is access monitoring?
It’s hard to know what’s happening with critical access and assets if no one is watching. Access governance can create a secure system, and access controls can add friction, but you don’t know who is actually accessing what unless there are eyes on it.
The value of AI and ML for healthcare privacy, security, and compliance
The value of AI and ML for healthcare privacy, security, and compliance
If you’re a Chief Compliance or Chief Privacy Officer at a health delivery organization (HDO), you understand first-hand how critical it is to secure and protect your organization’s information. To succeed in a heavily regulated industry like healthcare, you must establish a culture that constantly strives for data protection, risk reduction, and across-the-board compliance.
What is access control?
What is access control?
Access governance is crucial when it comes to securing an organization’s critical access points and assets. But access governance alone isn’t enough. To add another, important, layer of security and mitigate mounting cyber threats, an organization needs to add friction and visibility as well as reduce risks when it comes to access rights.
Access intelligence — 3 cybersecurity insights for health system leaders
Access intelligence — 3 cybersecurity insights for health system leaders
Health systems today are more vulnerable than ever to data breaches and malicious cybercrime. Regular user access reviews are a key part of securing critical data, but it comes with challenges, costs and potential roadblocks.
What is access governance?
What is access governance?
63% of organizations don’t have visibility into the level of access and permissions their users have to critical systems. Too many organizations aren’t implementing and enforcing access policies to their most critical assets, like systems, data, networks, infrastructure, and operational technology.
October is national cybersecurity awareness month 2021!
October is national cybersecurity awareness month 2021!
October is cybersecurity awareness month! But what does this mean for your business? With the number of data breaches continuing to skyrocket, 51% of which were tied to third-party vendors, this month-long initiative is the perfect opportunity for your organization to take a closer look at your own cybersecurity infrastructure and strategy.
The success story of CynexLink and SecureLink
The success story of CynexLink and SecureLink
SecureLink is proud to introduce our enhanced Partner program, PartnerLink.
Mesh of connected devices and modalities
Easing password pains: How CISOs can implement real, complex passwords and keep clinicians happy
In a previous post, I talked about complex passwords and how to strike the right balance between security and clinical workflow efficiency. And with breaches continuing to be on the rise – more than a 50% increase in healthcare in 2020 – that message rings true more than ever.
How to achieve HITRUST compliance
How to achieve HITRUST compliance
It’s no secret that healthcare organizations contain endless sensitive and critical assets. Patient files and electronic medical records (EMR) are not only important, but some of the most highly valued assets on the black market. In fact, healthcare related breaches increased by 55.1% in 2020.
Becoming HIPAA-compliant: Everything you need to know
Becoming HIPAA-compliant: Everything you need to know
The Health Insurance Portability and Accountability Act was initially passed in 1996, and it has drastically modernized the healthcare industry as well as increased security surrounding the handling of protected health information (PHI). While HIPAA has done a lot to ensure peace of mind for patients, HIPAA compliance has often become quite a headache for small to large businesses alike.
How user access reviews manage insider threats
How user access reviews manage insider threats
The threat isn’t always coming from outside an organization. In any organization, big or small, employees are given access to critical information, files, data, and more. It may seem like employees, or internal users, would be the obvious people to trust with these kinds of assets.
Microsoft Power Apps breach exposes third party security vulnerabilities
Microsoft Power Apps breach exposes third party security vulnerabilities
Take the ten-question reality check: How confident are you in your ability to protect customer data?
Reactive vs. proactive cybersecurity
Reactive vs. proactive cybersecurity
The government is taking on cybersecurity matters with gusto and leading the charge with some pretty heavy hitters like Amazon, IBM, Apple and Google. Not to mention, the latest cybersecurity initiative involving the private sector follows two mandates addressing the improvement of cybersecurity of the federal government and enhancing cybersecurity measures of critical infrastructure. It’s the momentum that the cybersecurity industry loves to see.
wes-wright
T-Mobile breach exposed data of 40 million: How safe is your customers’ personal information?
Without a “defense in depth” security strategy you risk losing much more than customer data.