Back To All Posts

Filtered by: 'Security'

Ransomware Epidemic: Why Hospitals Have Become Prime Targets for Cyber Criminals

Ransomware attacks on hospitals are increasing in frequency and severity. These attacks—in which cybercriminals hold patient data and IT systems hostage, demanding ransom to restore access—can severely disrupt hospital operations and endanger ... Read more
| Author Kate Wang, tagged in Security

Ransomware: The Digital Plague Infecting Hospitals Across America

Ransomware attacks on hospitals are increasing in frequency and severity. Hospitals are faced with significant financial consequences beyond ransom payments. Meanwhile, by blocking access to essential patient data and forcing the shutdown of ... Read more
| Author Gerry Miller, tagged in Security

Petersen Health Care Files Bankruptcy After Data Breach

For Petersen Health Care, a data breach became the tipping point; it was the last thing their precarious financial situation needed. ... Read more
| Author Kate Wang, tagged in Security

Five Best Practices for Security in Amazon SageMaker

Machine learning is rapidly transforming the healthcare industry and the role that technology plays in patient care. But these innovative new models can’t just run on our laptops, they have to be hosted in an environment where they can be powered by ... Read more
| Author Tom Burge, tagged in Security, machine learning

Generative AI and Machine Learning Security: 11 Best Practices

The explosion of large language models (LLMs) like ChatGPT onto the scene happened a little over a year ago, and since then it has become clear that the underlying technology can be deployed for everything from marketing and education to music ... Read more
| Author Josh Ray, tagged in Security, generative AI

Top AI and Machine Learning Security Threats 2024

If the past year had to have a name, it would surely be called the “Year of AI.” Widespread media coverage of ChatGPT and similar offerings made it abundantly clear that artificial intelligence (AI) and machine learning (ML) have profound value to ... Read more
| Author Josh Ray, tagged in Security, generative AI

Data Breach Impacts 33 Million French Residents

Two third-party payment operators were recently breached, leaking the personal information of nearly half of France’s population. ... Read more
| Author Abby Grifno, tagged in Security

HIPAA Compliance 164.312(e)(1) - Transmission Security

Within the HIPAA Security Rule are Administrative, Physical, and Technical Safeguards. These safeguards are as important to understand as they are to implement, so let’s dive into one: 164.312(e)(1) - Transmission Security . Implement technical ... Read more
| Author Thomas Zinn, tagged in Compliance, Security, Encryption

Cloudticity Oxygen Compliance - A New HITRUST Audit Experience

Now that you are acquainted with HITRUST and have chosen to continue your journey, I want to thank you again for being proactive! If this is your first compliance series post, please start below: If you are new to HITRUST, start here. To get a ... Read more
| Author Thomas Zinn, tagged in Technical Articles, Healthcare Industry, About Cloudticity, Compliance, Security, Encryption, HITRUST, Cloudticity, Healthcare, audit

MSPs With Lax Security Measure Are Compromising Client Environments, Says Louisiana Secretary of State

If you've tuned into the cybersecurity news lately, you'll notice many MSPs are being challenged with having lax security measures for the businesses and government entities they service. At a recent meeting of the National Association of ... Read more
| Author Kate Wang, tagged in Security, cloud security

Subscribe Today

Healthcare technology is moving fast. Don’t miss a thing.

Subscribe Today

New call-to-action