Blog

We know you have a lot of questions. That’s why our team has curated top-notch resources to help you along your healthcare cybersecurity and compliance journey.

Network Cybersecurity Starts with Network Maintenance

Network Cybersecurity Starts with Network Maintenance

Author: Joshua Frazee, Information Security Consultant Healthcare organizations haven’t always provided their ...
The Privacy Impact Assessment: Identifying and Minimizing Risks of PII Exposure

The Privacy Impact Assessment: Identifying and Minimizing Risks of PII Exposure

As regulators and consumers alike apply greater scrutiny to how patient data is being shared across the healthcare ...
A Look at HITRUST Version 11: Everything You Need to Know

A Look at HITRUST Version 11: Everything You Need to Know

As organizations that are HITRUST certified, pursuing certification, or have been making plans to do so review the ...
Active Incident Response Planning: Find it, Fix it, and Go Forward

Active Incident Response Planning: Find it, Fix it, and Go Forward

As healthcare continues to top the list of industries targeted by cyberattacks—and has the highest cost of a ...
10 Must-Have Cyber Defenses to Help You Get—and Keep—Cyber Insurance Coverage

10 Must-Have Cyber Defenses to Help You Get—and Keep—Cyber Insurance Coverage

Driven largely by an ongoing increase in ransomware attacks and payouts, cyber insurance carriers today require ...
The Benefits of AI in Healthcare are Vast, So Are the Risks

The Benefits of AI in Healthcare are Vast, So Are the Risks

An AI Risk Management Framework Can Decrease Risks While Accelerating Adoption Healthcare organizations are ...
Cyber Briefing | November 2023

Cyber Briefing | November 2023

Clearwater CEO Steve Cagle kicked off November's Cyber Briefing with a threat intel update, providing healthcare ...
Risks for Healthcare Organizations that can Expose Active Directory Accounts

Risks for Healthcare Organizations that can Expose Active Directory Accounts

Author: Fabian Crespo, Consultant, Technical Testing Microsoft Active Directory (AD) (Azure Active ...
Scanning for Trouble: The Hidden Dangers of QR Code ’Quishing’ Attacks 

Scanning for Trouble: The Hidden Dangers of QR Code ’Quishing’ Attacks 

Author: Tyler L. Jones, MSIT, CEH, PJMR, CCTHP, ASV | Clearwater Sr. Cybersecurity Analyst, Incident Response ...
Industry at Risk: Reconsidering the One-Size-Fits-All Approach to Healthcare Risk Analysis

Industry at Risk: Reconsidering the One-Size-Fits-All Approach to Healthcare Risk Analysis

For over a decade, the HIPAA Security Rule has required covered entities and business associates to engage in risk ...
Cyber Briefing | October 2023

Cyber Briefing | October 2023

We're here to make sure you stay in the know about the latest in cybersecurity and healthcare trends. Our goal is ...
Collaboration is the Key to Driving Strong Healthcare Governance Programs

Collaboration is the Key to Driving Strong Healthcare Governance Programs

It’s a common scenario—someone on your IT, compliance, or security team discovers a problem. It might be lost ...

Newsletter

Sign up to receive our monthly newsletter featuring resources curated specifically to your concerns.


Featured Resource