Agio Pulse

Your go-to for thought leadership on cybersecurity events and hot topics for the healthcare industry. Stay in the loop.

Read the latest

Colonial Pipeline Ransomware: What We Can Learn from This Attack
Colonial Pipeline Ransomware: What We Can Learn from This Attack
Ensure your organization has the proper processes, tools and people in place to reduce the likelihood of successful attacks.
10 Ways to Maximize Privilege for Cybersecurity Forensic Reports
10 Ways to Maximize Privilege for Cybersecurity Forensic Reports
Ten ways to maximize privilege for cybersecurity forensic reports to keep your reports protected.
Keep Your Data Safe During a Nation-State Threat
Keep Your Data Safe During a Nation-State Threat
An inside look at what happened with SolarWinds and how to protect yourself when the unexpected comes calling.
A Brief Overview of U.S. Privacy Laws
A Brief Overview of U.S. Privacy Laws
A brief overview of U.S. privacy laws that give protections to individuals regarding the collection, use, and disclosure of personal information by both the public and private sectors.
Hashed Passwords Are Personal Information Under U.S. Law
Hashed Passwords Are Personal Information Under U.S. Law
How a bad actor group affected the legal implications of cracking hashed passwords, and what SHA-256 is.
Your Network is Only as Secure as Your Vendors’ Networks
Your Network is Only as Secure as Your Vendors’ Networks
Vulnerabilities introduced by third-party vendors account for about two-thirds of all data breaches.
HIPAA Safe Harbor Bill Becomes Law; Requires HHS to Incentivize Security
HIPAA Safe Harbor Bill Becomes Law; Requires HHS to Incentivize Security
On January 5, 2021, the HR 7898 - HIPAA Safe Harbor Bill, was signed into law, which amends the Health Information Technology for Economic and Clinical Health (HITECH) Act.
SEC Adopts Rules Permitting E-Signature Authorization
SEC Adopts Rules Permitting E-Signature Authorization
On November 17, 2020, the Securities and Exchange Commission (SEC) voted to allow e-signatures, subject to certain prerequisites, on documents filed with the SEC via the Electronic Data Gathering, Analysis, and Retrieval system.
Ransomware Poses an Imminent Threat to U.S. Healthcare
Ransomware Poses an Imminent Threat to U.S. Healthcare
Tips and recommendations to inform your defense against this most troubling form of malware.
Can Your Employees Handle an Attack Every 11 Seconds?
Can Your Employees Handle an Attack Every 11 Seconds?
Training end users to be vigilant against cyber-attacks is the first step towards keeping your organization secure.
The Watch Commander’s Log: Hacking Awareness & Alternate Data Streams (ADS)
The Watch Commander’s Log: Hacking Awareness & Alternate Data Streams (ADS)
This post highlights some of the common technology that bad actors may use against systems to orchestrate attacks.
The Watch Commander’s Log: New Email from Evil Corp
The Watch Commander’s Log: New Email from Evil Corp
Last year’s notorious malware masterminds are at it again.
Key Takeaways from Verizon’s 2020 Data Breach Investigation Report
Key Takeaways from Verizon’s 2020 Data Breach Investigation Report
Agio Healthcare's Managing Director of Cybersecurity offers his take on this year’s report.
The Hidden ROI of HITRUST Certification
The Hidden ROI of HITRUST Certification
Pursuing a HITRUST certification might free up key resources to accelerate your business.
4 Reasons Why You Need a HITRUST Partner Now
4 Reasons Why You Need a HITRUST Partner Now
Discover why our clients are finding value in our HITRUST Advisory Partnership now more than ever.