Author: Brent Goedel
Employees are critical to an organization’s network security. They are frequently exposed to sophisticated phishing and ransomware attacks. Did you know, 91% of successful data breaches started with a spear phishing attack? Employees should be educated so they know what to look for and can remain vigilant with security as...
Read More
HITRUST has three assessments that can help companies define and understand their security posture. We will preview each of these assessments and associated benefits to help decide which is best for your entity. HITRUST Basic, Current state (bC) Verified Self-Assessment The HITRUST bC is a self-assessment that uses the HITRUST...
Read More
What is TEFCA? The Trusted Exchange Framework and Common Agreement, also known as TEFCA, outlines a common set of principles, terms, and conditions to support the development of a Common Agreement that would help enable nationwide exchange of electronic health information (EHI) across disparate health information networks (HINs). The TEFCA is designed to...
Read More
The following information comes from our partners at Fortinet: Threat actors heavily use COVID-19 themed phishing templates. Their main target are official government sites and trusted non-governmental organizations such as the World Health Organization (WHO), Centers for Disease Control (CDC), Internal Revenue Service (IRS), and multiple governments. The majority of...
Read More
The following information comes from our partners at KnowBe4: Microsoft this week warned about a massive phishing attack that started on May 12. The campaign sends emails that look like they are from the “Johns Hopkins Center”, and they have an Excel attachment that claims to be US deaths caused...
Read More