Healthcare Information Security

Cybersecurity Resources

Study Results: Email Vulnerability in Healthcare

In a recent study to understand Dark Web email vulnerabilities, Evolve IP and ID Agent reviewed over 1,000 healthcare industry organizations. The findings? 68% of all analyzed covered entities and their business associates have employees with... Download white paper

What Constitutes Effective Security Awareness Training

Employees are a critical part of an organization’s defense against many IT security threats. Just as having the correct technology solutions is important, training personnel to recognize security threats is a critical part of any security... Download white paper

Best Practices for Dealing With Phishing and Ransomware

Phishing and ransomware are serious problems that can steal data or disable access to your organization’s network. Both ransomware and phishing are increasingly common and are having devastating impacts on businesses of all sizes. The FBI... Download white paper

[Crash Course]: 5 Steps to Protect PHI and Pass HIPAA with Less Effort

Analytics have named 2017 “the year of the healthcare breach” — which is exactly what they called 2016. As the threats continue to grow, you need strategies for protecting your organization. In this hands-on session, experts... View webcast

Endpoint Protection Ransomware Effectiveness

It's estimated that in 2016, the cost of ransomware was over $1 Billion, making it the most lucrative criminal business model in the history of malware. In this report we examined who is at risk, what the scope and cost of an attack is, how... Download white paper

Securing Health IT Infrastructure to Avoid the Breach

Healthcare providers and their patients are increasingly becoming a target of cyberattacks. A recent Accenture survey found that 26 percent of consumers had their personal medical information stolen, with half of those cases leading to identity... View webcast

Forrester Total Economic Impact Study: Security Awareness Training and Simulated Phishing Platform

KnowBe4 recently commissioned Forrester to conduct a Total Economic Impact™ (TEI) study, examining the potential Return on Investment (ROI) enterprises might realize by implementing the KnowBe4 Security Awareness Training and Simulated... Download white paper

Preventing and Mitigating Ransomware Infections

Not a week goes by without hearing about a network breach of some major corporation, agency or public figure, including government officials! This webinar we will describe today's threat landscape and offer some practical, every-day protections... View webcast

Ransomware Hostage Rescue Guide Part 2 of 2

In part 2 of this webinar, we will cover the final 3 sections of the very popular KnowBe4 Ransomware Hostage Rescue Manual in depth. Including actionable items you can use like, if you should negotiate or pay the ransom, a ransomware prevention... View webcast

Ransomware Hostage Rescue Guide Part 1 of 2

2016 was a “Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight for 2017. We will... View webcast

Compliance Does Not Equal Security: 3 Emerging Security Themes in Healthcare

Ninety-six percent of industry IT security experts feel vulnerable to a data breach, and 63 percent report having suffered one. Despite these concerns, 69 percent feel that meeting compliance requirements is “very” or “extremely”... Download white paper

Pegasus iOS Attack Overview

Organizations that have standardized on Apple devices might have been feeling rather smug when the HummingBad and Quadrooter vulnerabilities broke headlines, as Apple devices were unaffected. However, the grins have quickly turned to grimaces... Download white paper

Overview of HummingBad

HummingBad is the latest high profile malware designed for mobile devices. In this particular malware the attack is targeted at Android devices. Check Point, the IT security company that first detected the malware, estimates that it has infiltrated... Download white paper

Data Breach Incident Response Workbook

The consequences of data breaches are higher than ever, and are no longer limited to the privacy department – accountability has moved to C-level executives and board members. Greater consequences mean that businesses need to be prepared... Download white paper

Prepare and Respond to Healthcare Ransomware Attacks

Healthcare ransomware has become an increasingly common type of cybersecurity attack as medical records have grown in value on the black market. Ransomware is not a new threat, but the number of attacks increased in 2015 and has led the federal... View webcast

Preventing the Next Generation of Healthcare Security Attacks

Today we are faced with a high-threat world, where cybercriminals are constantly targeting healthcare organizations. And as attackers grow more sophisticated in their methodologies, your security strategies and defenses must grow more sophisticated... View webcast

Don’t Let Your Security Strategy Become Irrelevant

A new report from Forrester Research says most security strategies do not align with overall business goals, and are in danger of losing credibility. Don’t fall into this trap of irrelevance. Download the report and learn 6 steps your business... Download white paper

Is Your Team Prepared for a Data Breach?

As data breaches increase in scale and frequency, businesses must prepare today to ensure an effective, high-quality, and swift response. Consumers, regulators, and the media want a well-orchestrated response launched just days after a data breach,... Download white paper

Find Out the Trust Cost of a Data Breach – and How to Prepare

There’s no doubt the cyber threat landscape is vast and complex. These days, it’s not a question of whether a company will experience a data breach – it’s when and how extensive. Understanding the true cost of a breach... Download white paper

Focus on Human Nature to Respond More Effectively During a Breach

To execute an effective breach response, organizations must consider the significant role that human emotions can play during a crisis. The most thorough preparation pre-breach won’t matter if your response team is derailed by emotions... Download white paper