Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Health Risk Assessments Drive Preventive Care and Lower Long-Term Costs?

Health Risk Assessments are increasingly used to support preventive care planning and population health management across healthcare systems.According to the CDC, chronic and mental health conditions account for the majority of U.S. healthcare spending, which exceeds $4 trillion annually.These assessments help identify risks earlier, when interventions are typically more effective and less resource-intensive.

How Hospitals Sustain Patient Care When Systems Go Dark

In this episode of Building Cyber Resilience: A Healthcare Leader’s Guide, host Josh Howell speaks with Drex DeFord, veteran healthcare CIO, strategist, and President of 229 Cyber & Risk at This Week Health. Drawing on decades of experience leading technology and transformation across organizations like the U.S. Air Force, Seattle Children’s, Scripps Health, and Steward Healthcare, Drex explores what it really takes to sustain patient care when cyberattacks force systems offline.

Acupuncture in Chicago, IL: How to Choose the Right Clinic

Choosing a clinic for acupuncture in Chicago, IL can feel overwhelming because there are many options, and not all clinics approach care the same way. The right choice usually depends on how clearly a clinic explains its process, how it integrates acupuncture into overall care, and how comfortable you feel during the first interaction. Acupuncture works best when it is delivered in a structured, clinical environment rather than as a generic wellness service with little individual assessment.

Mastering HIPAA compliance in telemedicine: Secure remote healthcare delivery in 2026

Telemedicine has revolutionized healthcare delivery, enabling patients to access medical consultations from the comfort of their homes. However, this shift to virtual care necessitates strict adherence to the Health Insurance Portability and Accountability Act (HIPAA) to ensure the protection of patient privacy and the security of electronic health information.

Why Your WAF Missed It: The Danger of Double-Encoding and Evasion Techniques in Healthcare Security

If you ask most organizations how they protect their APIs, they point to their WAF (Web Application Firewall). They have the OWASP Top 10 rules enabled. The dashboard is green. They feel safe. But attackers know exactly how your WAF works, and, more importantly, how to trick it. We recently worked with a major enterprise customer, a global leader in healthcare technology, who experienced this firsthand.

The Minimum Viable Hospital: Protecting Patient Care When Everything Is Offline

In this episode of Building Cyber Resilience: A Healthcare Leader’s Guide, host Josh Howell sits down with Dr. Sam Bhatia, Medical Director for Innovation in Microsoft’s Health & Life Sciences division. With a career that spans clinical practice, pathology-focused informatics, and global technology leadership, Dr. Bhatia brings a rare dual perspective on how hospitals can protect patient care when core systems fail. He breaks down how to define the Minimum Viable Hospital, why clinicians must shape recovery priorities, and how hybrid downtime models powered by AI can help health systems navigate the next decade of cyber disruptions.

Backup vs Disaster Recovery for Medical Practices: What's the Difference?

Many medical practice administrators believe their organization is protected because “we have backups.” When asked about disaster recovery, they point to the same backup system. This confusion between backup and disaster recovery creates significant risk, because backup alone cannot restore operations quickly enough when systems fail. The distinction matters because patient care depends on system availability.

Healthcare Ransomware Recovery: A HIPAA-Compliant Response Framework

Healthcare remains the most targeted sector for ransomware attacks, with 238 ransomware incidents reported to the FBI in 2024 alone. The Change Healthcare attack demonstrated the cascading impact a single breach can have across the entire healthcare ecosystem, affecting payment processing for providers nationwide and ultimately compromising data on an estimated 190 million individuals.

HIPAA Incident Response Plan for Website PHI Leaks

Traditional HIPAA response plans were built for the incidents everyone can picture, like a compromised server, ransomware in the network, or unauthorized access to a clinical database. But website PHI leaks are different altogether. Often, there’s no attacker and no break-in. The leak comes from authorized tracking pixels or third-party analytics scripts simply collecting and sending data as designed, but on pages where it should never touch patient information in the first place.

HIPAA Breach Notification Rule: Meeting the 60-Day Timeline for Website PHI Exposure

Earlier, the anatomy of a HIPAA breach felt tangible. The threat landscape was shaped by risks you could point to, such as physical theft, phishing, or simple human error. Now, some of the biggest risks live in your website and run quietly in the background. Third-party scripts, tracking pixels, and analytics tags can collect or transmit PHI to external parties while looking like routine marketing infrastructure.