Healthcare-focused ransomware attacks have become increasingly common in the U.S., causing major disruptions to patient care. Ransomware attacks have crippled the access to patients’ electronic health records (EHRs), shut down critical communication channels within...
October is Cybersecurity Awareness Month. To help support cybersecurity awareness, we’re going back to basics. A refresher of sorts, to remind you of the fundamentals, the MVP (minimally viable product) you need to ward off hackers. All too often, we’re seeing...
Let’s face it: Any industry could be subject to a cyber attack. Hackers are always on the lookout for an easy target. However, some industries are more vulnerable than others. The distinction is typically based on the potential profitability. How much data can a...
Over the last few years, cyber threats have surged and regulations have evolved, both of which have impacted the price and availability of cyber insurance. After the more recent and costly attacks, including SolarWinds and Colonial Pipeline, insurers have been...
A common complaint of vendor risk assessments is time. The time it takes a vendor to complete assessments, the time it takes the assessor to review the assessments, and the time it takes for gap analysis and remediation. Many companies quickly become fed up with the...