Welcome to the Cloudticity Blog

Join in the conversation on healthcare technology, security, compliance, and interoperability.


AWS Well-Architected Framework: Unpacking the Six Key Pillars

Healthcare organizations are increasingly tapping into public cloud services to build innovative applications and services. But architecting optimal cloud environments can be a daunting task—especially for teams that are used to on-premises ... Read more
| Author Josh Ray, tagged in aws

MCG Health Settles Data Breach Suit for $8.8 Million

The vendor’s data breach impacted 1.1 million people, but it took the company 2 years to catch. ... Read more
| Author Abby Grifno, tagged in News, ransomware

Enzo Biochem Reaches $4.5M Settlement Following Ransomware Attack

The diagnostic testing laboratory settled with New York, Connecticut, and New Jersey following a breach that exposed 2.4 million people’s data. ... Read more
| Author Abby Grifno, tagged in News, ransomware

OneBlood Recovers from Ransomware Event

The not-for-profit blood center experienced downed operations that directly impacted patient care. ... Read more
| Author Abby Grifno, tagged in News, ransomware

Guide to Conducting an AWS Well-Architected Framework Review

Organizations across all sectors recognize the tremendous potential benefits of developing and running applications in the cloud. But many teams need assistance with building optimal architectures to support those applications. ... Read more
| Author Josh Ray, tagged in aws

Ransomware Prevention Checklist: Proven Steps to Safeguard Your Data

How prepared is your organization for the next ransomware attack? Ransomware continues to plague healthcare organizations. Cybercriminals see a tremendous opportunity for financial gain by disrupting the normal operations of healthcare organizations ... Read more
| Author Josh Ray, tagged in ransomware

Defense-in-Depth Security: Overview and Implementation Guide

As cyber threats are constantly evolving and becoming more sophisticated, a robust and multi-layered security approach is essential. One such approach is the Defense in Depth (DiD) strategy, which leverages multiple layers of security controls and ... Read more
| Author Josh Ray, tagged in Security

16 Ransomware Examples and How They Work

Ransomware continues to plague healthcare organizations. Cybercriminals realize there is enormous potential for financial gain if they can successfully disrupt services and hold sensitive data hostage—and they keep succeeding. Under pressure to ... Read more
| Author Kate Wang, tagged in ransomware

Los Angeles Health Department Faces Cyber Attack

The attack exposed the personal information of more than 200,000 people in the county. ... Read more
| Author Abby Grifno, tagged in News, ransomware

Subscribe Today

Healthcare technology is moving fast. Don’t miss a thing.

Subscribe Today

New call-to-action