Bobby Seegmiller

Telehealth and COVID-19, Protecting ePHI

The traditional means of patients seeking treatment (in-person) has been disrupted and has accelerated the need for hospitals and clinics to adopt telehealth technologies. As organizations adopt these new technologies, precautions and appropriate safeguards should be taken to ensure ePHI stays secure.

email phishing attacks

Cloud email phishing attacks: A practical guide

A quick review of the HHS Breaches Over 500 list paints a pretty grim picture of the number of breaches affecting 500 or more individuals. Breaches have been steadily increasing and the culprit is clear: Hacking/IT incidents, namely email phishing attacks. Fraudsters and criminals are exploiting vast databases of compromised user credentials to make payroll.

Cloud Security in Healthcare

Guest Blog by Yiannis Koukouras, TwelveSec in collaboration with HIPAA One In our culture, something or someone is always trending. Whether it be bell-bottom jeans in the ’70’s, playing Nintendo in the ’80’s or watching stock market go up and down (whenever!), trends are a lenses through which we see the world. Much like trends …

Cloud Security in Healthcare Read More »

Answering the Age Old Question

True or False: Are penetration tests and vulnerability scans one in the same? If you answered “False” you are correct, however, it can be difficult to understand the difference between the two information security services. Whereas both are incredibly valuable in building a strong threat and vulnerability management program, penetration tests and vulnerability scans are …

Answering the Age Old Question Read More »

Scroll to Top