Why the Rosen-Cassidy Healthcare Cybersecurity Act May Fail Even If Passed
The Rosen-Cassidy bill is a heroic effort, but it needs money from the Infrastructure Act to support the Herculean efforts it will take to make us safe.
Which Gaps Did Log4j Expose in Your Cybersecurity Governance?
Log 4j exposes both business associates and patients. The time is here for everyone to build or contract a team of experts.
Introducing Agio Shield, the Latest Enhancement to Our XDR Service
Agio Shield leverages AI to detect new cyber threats before they reach your people.
How to be a Healthcare BA and Not Lose 25 Million PHI Records
Cybersecurity in healthcare had a big year, pointing out the importance of adhering to Agio's "Brilliance in the Basics."
Ransomware Prevention, Simplified
With the right policies and processes in place, you can significantly minimize your organization’s likelihood of falling victim to ransomware.
10 Ways to Maximize Privilege for Cybersecurity Forensic Reports
Ten ways to maximize privilege for cybersecurity forensic reports to keep your reports protected.
Keep Your Data Safe During a Nation-State Threat
An inside look at what happened with SolarWinds and how to protect yourself when the unexpected comes calling.
A Brief Overview of U.S. Privacy Laws
A brief overview of U.S. privacy laws that give protections to individuals regarding the collection, use, and disclosure of personal information by both the public and private sectors.
Hashed Passwords Are Personal Information Under U.S. Law
How a bad actor group affected the legal implications of cracking hashed passwords, and what SHA-256 is.
HIPAA Safe Harbor Bill Becomes Law; Requires HHS to Incentivize Security
On January 5, 2021, the HR 7898 - HIPAA Safe Harbor Bill, was signed into law, which amends the Health Information Technology for Economic and Clinical Health (HITECH) Act.
SEC Adopts Rules Permitting E-Signature Authorization
On November 17, 2020, the Securities and Exchange Commission (SEC) voted to allow e-signatures, subject to certain prerequisites, on documents filed with the SEC via the Electronic Data Gathering, Analysis, and Retrieval system.
Ransomware Poses an Imminent Threat to U.S. Healthcare
Tips and recommendations to inform your defense against this most troubling form of malware.
Can Your Employees Handle an Attack Every 11 Seconds?
Training end users to be vigilant against cyber-attacks is the first step towards keeping your organization secure.
The Watch Commander’s Log: Hacking Awareness & Alternate Data Streams (ADS)
This post highlights some of the common technology that bad actors may use against systems to orchestrate attacks.
The Watch Commander’s Log: New Email from Evil Corp
Last year’s notorious malware masterminds are at it again.