Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Top 10 Most Common HIPAA Violations and How to Avoid Them

The healthcare industry has been plagued by inadequate security measures and common protocol mistakes that result in significant penalties imposed by HIPAA (Health Insurance Portability and Accountability Act). Poor security protocols, neglected risk assessment audits, internal human errors, and the lack of employee HIPAA training are just a few factors contributing to lost, compromised, or stolen patient data and sensitive medical records.

How FIM Protects Assets in a Borderless World

Recent advancements in the digital landscape have led to a new kind of paradigm, one where enterprise perimeters are no longer clearly defined or limited. The rapid uptake of remote working, cloud, and IoT led to these prominent shifts, resulting in users, applications, and data no longer residing exclusively within the perimeters of the enterprise. This has led to enterprise perimeters becoming “borderless”.

National Cyber Security Centre (NCSC) annual review 2022: Highlights and thoughts

The National Cyber Security Centre (NCSC) is the UK’s technical authority for cybersecurity. Established in 2016, it has worked to improve online safety and security, and has brought clarity and insight to an increasingly complex online world. In its 6th annual review, it gives insights to its understanding of the cyber environment affecting the UK. One of the most important roles of the NCSC is to identify, monitor, and analyse key cybersecurity threats, risks, and vulnerabilities.

51 HIPAA Statistics Every Healthcare Entity Needs to Know in 2022

The HIPAA Privacy Rule (Health Insurance Portability and Accountability Act of 1996) is a healthcare cybersecurity framework that mandates security standards for all HIPAA-covered entities. HIPAA aims to protect patient information in the public health sector and promote stronger cybersecurity policies. HIPAA standards have since been adopted worldwide and enforced as federal law in the United States.

NIST SP 800-171: What You Need to Know

Like many industries, the federal government and the Department of Defense (DoD) are more digital, more dispersed, and work with more third parties than ever before. This shift means that information the departments deal with, referred to as controlled unclassified information, needs to be protected due to its high value. Enter “Safeguarding covered defense information and cyber incident reporting,” which is part of the Defense Federal Acquisition Regulation Supplement (DFARS) requirements.

Obrela Cybersecurity Predictions 2022

As 2021 draws to a close, it is safe to say the year has been a blockbuster for cybercrime. We have witnessed attacks on critical national infrastructure, which have impacted the supply of consumer commodities. We have seen law enforcement clamp down on cybercriminals, taking down some of the most ruthless operations that have wreaked havoc on organisations and consumers across the globe.

Latest and Best Software and Tools for New Businesses

As an entrepreneur, you know that the best tools and software can make a huge difference in your development as a business owner. From managing your business to growing it, from scaling it up to automating it, these are some of the most exciting tools available for entrepreneurs who want to build their businesses.

Five worthy reads: Understanding cyber insurance and why it is important for your business

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we are exploring cyber insurance, how it can help businesses in the event of a cyberattack, and why it is necessary for your organization.