PatientEngagementHIT

Cybersecurity Resources

Detecting and Responding to Cyber Attacks in Healthcare

The healthcare sector has remained a prime target for cybercriminals for the last several years. More concerning is that for many health delivery organizations a lot of these network intrusions can remain undetected for long periods of time... View webcast

5 Best Practices for Mitigating Medical Device Security Risks

Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attack... Download white paper

Webcast: How Medical Devices Risk Patient Safety and Security

Only 51% of device makers follow guidance from the FDA to mitigate or reduce inherent security risks. See how hospitals can harness the benefits of connected medical devices to achieve operational efficiencies, provide better patient care a... Download white paper

IoT Risks & Rewards: What Every CXO Should Know

Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there&rs... Download white paper

eBook: Using Secure IoT to Drive Business Growth

IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better inform... Download white paper

12 Ways to Defeat Two-Factor Authentication

Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't! Join Roger A. Grimes, KnowBe4's Data-Driven De... View webcast

State of Medical Device Cybersecurity and Emerging Technologies for Staying Ahead of Risk

Medical device security has become a much bigger concern for healthcare organizations in recent years. Vulnerable devices not only pose a risk to patients but also to organizations’ networks and systems.   A number of initiatives... View webcast

Levers of Human Deception: the Science and Methodology Behind Social Engineering

No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.... View webcast

Securing Endpoint Devices Against Unauthorized Access

Medical device security has become a much bigger concern for healthcare organizations since ransomware attackers began using vulnerable medical devices in their attack campaigns. At the same time, there has always been industry and regulato... View webcast

Implementing Best Practices for Securing Patient Data

Cybercriminals are putting more time and resources into exploiting and monetizing patient data, with medical record information proving more valuable than Social Security numbers and other personally identifiable information (PII). As a res... View webcast

HIPAA Data Security Best Practices

In a healthcare environment increasingly dependent on the sharing of electronic protected health information (PHI), covered entities (CEs) must adopt best practices for safeguarding against unauthorized access to sensitive patient data. As ... View webcast

Ransomware in the Healthcare Industry: Fighting the Infection

In the healthcare industry, ransomware infections are their own medical emergency. Ransomware is the most common type of malware according to the 2018 Verizon Data Breach Investigations Report. Ransomware found in malware-related data breac... View webcast

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud

Osterman Research conducted a survey among corporate decisions makers in early 2018 and found that nearly 28% of those organizations had experienced a phishing attack that was successful in infecting their networks with malware.  Over ... Download white paper

Threat Impact and Endpoint Protection Report

Ransomware is a multi-billion dollar business with the number of new ransomware variants continuing to grow quarter-over-quarter. Despite the many security offerings available, organizations continue to fall victim to ransomware attacks. Fo... Download white paper

Ransomware Hostage Rescue Manual

Get the most complete Ransomware Manual packed with actionable info that you need to have to prevent infections, and what to do when you are hit with ransomware, complete with a Ransomware Attack Response Checklist and Ransomware Prevention... Download white paper

Protecting Data in the Healthcare Industry

Data breaches are becoming too common,  Stealing healthcare records is a lucrative business.  These records can contain personal, medical, and financial information that a criminal requires for identity theft. Despite all of ... Download white paper

Techniques for Dealing with Ransomware, Business Email Compromise, and Spearphishing

Ransomware alone cost organizations an estimated $1 billion in 2016, up from $24 million in 2015 and there is no end in sight for 2017! Ransomware, business email compromise, and spearphishing are serious problems that can steal your data, ... Download white paper

The Phishing Breakthrough Point

Utilizing security awareness training and phishing security tests can be a useful and effective tool to reduce unintentional insider threats. However, if robust metrics are not put in place to effectively gauge the click rate patterns from ... Download white paper

Forrester Total Economic Impact Study: Security Awareness Training and Simulated Phishing Platform

KnowBe4 recently commissioned Forrester to conduct a Total Economic Impact™ (TEI) study, examining the potential Return on Investment (ROI) enterprises might realize by implementing the KnowBe4 Security Awareness Training and Simulate... Download white paper

Preventing and Mitigating Ransomware Infections

Not a week goes by without hearing about a network breach of some major corporation, agency or public figure, including government officials! This webinar we will describe today's threat landscape and offer some practical, every-day pro... View webcast

X

Sign up for our free newsletter:

Our privacy policy


no, thanks

Continue to site...