Corporate Identities - that is, usernames and passwords - continue to be one of the main points of attack against businesses. For a reason! Many points of authentication are internet-facing humans who generally do a poor job of choosing passwords and can be easily manipulated into giving out their credentials.
Topics: public cloud, Cybersecurity
Topics: Healthcare, Cybersecurity
3 Key Factors in Creating a Culture of Healthcare Security
Establishing a strong culture of security in any organization can be tough. I should know. I am a cybersecurity engineer, performing HIPAA-required security risk analyses for healthcare organizations of all sizes. Through the years, I have learned the organizations that take cybersecurity culture seriously continuously remind patients of their information privacy rights, have two-factor authentication on protected systems, give security badges that open secure doors and areas, and much more. Unfortunately, even these smart and commendable tactics are not enough to ward off a breach (and the HIPAA fines that could follow). Through my experience, the ONLY way to create a culture of security is to incorporate these three factors:
Topics: Healthcare, Cybersecurity
All healthcare providers that accept Medicare or Medicaid patients have heard of MACRA (Medicare Access and CHIP Re-authorization Act), a reward-based financial reimbursement program for providers that deliver a higher quality of care and increased positive patient health outcomes at lower costs. That’s where MIPS – Merit-based Incentive Payment System – comes in and our best tip for earning the points you need to get a full reimbursement.
Topics: Healthcare, Cybersecurity
In case you missed it, I recently wrote a blog detailing how to run your own breach simulations. But do you know why running them is important? Defining the outcome is the first step to determine the answer to this question.
Topics: Cybersecurity
Ethical hackers routinely find computer systems connected to production networks that have been compromised for months. In most cases, the telltale signs of compromise are present, but the right people weren’t watching or being alerted to the activity.
Topics: Cybersecurity
C Spire Business is a privately-held telecommunications and technology company driven to deliver the best experiences in wireless, fiber internet, and business IT solutions such as internet, VoIP, cloud and managed services. Read more news releases and announcements at cspire.com/news. For more information, visit cspire.com or find us on Facebook, Twitter or Instagram.
The information contained in this site is provided for informational purposes only, and should not be construed as legal advice on any subject matter.
Sign up for our monthly newsletter.
For the latest in technology trends, industry news, and C Spire updates.