Blog

Blog

What Is a Health Information System?

Learn what a health information system (HIS) is and how they're key to managing healthcare data, along with HIS benefits, best practices, and more.
Blog

What Is HIPAA Compliance?

Learn about the Health Insurance Portability and Accountability Act (HIPAA) and the requirements for HIPAA compliance in Data Protection 101, our series on the fundamentals of information security.
Blog

Two Years of the PATCH Act: Protecting Patients from Outdated Medical Devices

We have all dealt with outdated technology. An old phone that no longer gets updates. A laptop that takes minutes to boot. The stubborn printer that jams every second page. You have probably seen a payment kiosk crash, revealing an ancient Windows XP desktop beneath. Glitches are particularly annoying when they happen to an ATM. But hospitals have similar problems. And here, it is no laughing...
Blog

Ransomware Pivot: From Hospitals to High Street

Last year, headline news of staggering ransomware attacks was inescapable. But according to new research by Comparitech, those numbers may be slowing down.By studying 211 ransomware attacks on the healthcare sector in H1 2025, the firm noted only a 4% increase year-over-year. While this still represents a modest improvement, figures for other “easier/more lucrative” industries were much higher,...
Blog

Prescription For Disaster: Sensitive Patient Data Leaked in Ascension Breach

Ascension, one of the largest private healthcare companies in the United States, has confirmed that the personal data of some 437,329 patients has been exposed following an attack by cybercriminals. To the undoubted distress of Ascension's client base, the details of hundreds of thousands have fallen into the hands of hackers, opening up opportunities for fraud and identity theft. Breached...
Blog

Friday Five: The Vulnerable Healthcare Industry, Workplace Cyber Threats, & More

HEALTHCARE'S GRIM CYBER PROGNOSIS REQUIRES SECURITY BOOSTER BY ROBERT LEMOSThe healthcare sector is increasingly vulnerable to cyberattacks, particularly ransomware, with 66% of organizations experiencing attacks in the past year, up from 60%. Emerging threats like the Trinity ransomware group are raising alarms, with cyberattacks like theirs disrupting services, exposing sensitive patient data,...
Blog

The Challenge of Securing Bluetooth Technology in Healthcare

It’s the age-old question: when does convenience undermine security? In the healthcare sector, the answer can literally spell the difference between life and death. As the Internet of Medical Things (IoMT) grows, wireless attacks abound. While not any harder to launch than against traditional IoT devices, these attacks are drastically more high-stakes and can use the Bluetooth and related...
Blog

Data Classification in Healthcare

Healthcare is a highly competitive industry where payers and providers are subject to significant regulatory oversight. The complex needs of these organizations, and their patients, must be delivered in as efficient a manner as possible, and with precision, while taking every precaution to ensure appropriate levels of data security and privacy.Given...