Blog
Recapping this year’s AWS re:Invent 2022
Amazon recently concluded their five-day long conference, AWS re:Invent 2022. This year’s conference was hybrid with the company streaming a significant portion of their in-person conference for free. For ten years now, the event has seen attendees across the cloud continuum come together to learn, share and get inspired. This year was no different as … Continued
read moreThe Importance of Role-Based Messaging in Healthcare
Do you remember the classic board game where you have to go back and forth with your opponent deducing which characters on the board you’ve each selected? It’s still played by children today, and unfortunately by healthcare teams as well. Every day, healthcare teams are forced to play a game of “Guess Who?” is on-call … Continued
read morePutting HC3’s Cyber Posture Recommendations into Practice
The Rising Threat of Cybercrime in Healthcare Of growing concern to both patients and the professionals who facilitate their care is the growing trend of healthcare organizations being preyed upon by cybercriminals. In the United States, recent political dialogue has brought special attention to patients’ privacy rights under HIPAA and the ongoing security of their … Continued
read moreThe Five Main Components of a Fully Developed EHR System
The adoption of electronic health record (EHR) systems has seen tremendous growth across geographies, especially in the US. According to American Hospital Association data shared by the Office of the National Coordinator for Health Information Technology, over 93% of American hospitals are enabled by some form of EHR in their organization. Implementing an EHR system … Continued
read moreZero Trust Security: Key Concepts and 7 Critical Best Practices
What is Zero Trust? Zero trust is a security model to help secure IT systems and environments. The core principle of this model is to never trust and always verify. It means never trusting devices by default, even those connected to a managed network or previously verified devices. Modern enterprise environments include networks consisting of … Continued
read moreWhat Is a Secure SDLC?
What Is a Secure SDLC? The Software Development Lifecycle (SDLC) framework defines the entire process required to plan, design, build, release, maintain and update software applications, including the final stages of replacing and decommissioning an application when needed. A Secure SDLC (SSDLC) builds on this process, integrating security at all stages of the lifecycle. When … Continued
read moreHow MSPs Can Provide Irreplaceable Value in Uncertain Times
If you have been following the financial news lately, you have surely become all too familiar with the challenging economic conditions that have emerged in 2022. Though the primary concern in the media is how a recession will affect consumers, the impact on businesses must also be considered. As rising inflationary concerns put pressure on … Continued
read moreWhat IT Pros Can Learn from the Marriott Data Breach
Despite the best efforts of individuals to protect their own data, they cannot always account for the cybersecurity shortcomings of larger organizations such as their employers, financial institutions, and healthcare providers entrusted with their personal information. Recently, it was made painfully apparent that hotels should also be added to this list of vulnerable entities based … Continued
read moreDeveloping a Data Breach Incident Response Plan
With cybersecurity boundaries going beyond the traditional walls of an office and attack surfaces constantly expanding, data breaches are inevitable. Managing risks from data breaches requires organizations to develop a comprehensive incident response plan – an established guideline that facilitates incident detection, response and containment, and empowers cybersecurity analysts to secure a company’s digital asset. … Continued
read more3 Effective Ways to Enhance Patient Safety with EHR Alerts
Hospitals that adopt electronic health records (EHR) to optimize clinical workflows face the decision of how to integrate EHR alerts into their workflows. The rationale is to surface actionable data from EHR systems and present healthcare providers with this information to supplement their day-to-day clinical decisions. Though providers gain immense value from EHR alerts that … Continued
read more