CybersecurityEthical HackingHIPAAHIPAA Privacy ComplianceHIPAA SecurityPenetration Testing Penetration Testing for Healthcare Cyber Security Penetration testing is part of a comprehensive cyber security strategy. Learn how RiverSpring Living partnered…Melany Joy BeckJuly 14, 2024
CybersecurityEthical HackingHIPAA SecurityPenetration Testing The Difference Between Vulnerability Scans and Penetration Tests We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…Jordan KeatingAugust 17, 2023
CybersecurityEthical HackingPenetration TestingPrivacy Verizon’s 2022 Data Breach Investigation Report Verizon has released their 2022 Data Breach Investigations Report! Verizon has been releasing an annual…Jordan KeatingJuly 2, 2022
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing The Difference Between Vulnerability Scans and Penetration Tests We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…Jordan KeatingJanuary 6, 2022
CybersecurityEthical HackingHIPAAHIPAA Security Mitigating the Risks of Relay Authentication Attacks – Reminder! What if we were to tell you that anyone connected to your network could simply…BOCadminJuly 20, 2021
CybersecurityEthical HackingHIPAAHIPAA SecurityPenetration TestingRansomware Ransomware is Finally Getting the Necessary Attention As many of us in the security field know, ransomware groups have been terrorizing people…Jordan KeatingJune 29, 2021
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration Testing Vulnerability Scans and Penetration Tests: What’s the Difference? We get questions regarding the difference between a vulnerability scan and a penetration test relatively often! We’re…Jordan KeatingApril 27, 2021
CybersecurityEthical HackingHIPAAHIPAA SecurityHIPAA ViolationsPenetration TestingPhishingRansomware Top 5 Security Threats of 2020 and What You Can do About It One of the first known malicious computer attacks was created in 1989 by evolutionary biologist…Jordan KeatingJanuary 15, 2021
CybersecurityEthical HackingHIPAAHIPAA Security Mitigating the Risks of Relay Authentication Attacks So, now that we have explained how the attacker can get access, it’s time to…BOCadminSeptember 18, 2020
CybersecurityEthical HackingHIPAAHIPAA Security The Risks of Relay Authentication Attacks What if we were to tell you that anyone connected to your network could simply…BOCadminSeptember 15, 2020