An Inside Job: Cybersecurity Threats from Internal Sources

Written by:

Many spy movies begin with the suspected antagonist being an outside enemy or threat only to find – plot twist – it was an inside job all along. The purported hero is actually the villain who broke the code by posing as a trusted insider. He...

Perception is Not Reality When It Comes to Cybersecurity

Written by:

There’s no shortage of statistics on the frequency and cost of cybersecurity attacks in healthcare. So why isn’t everyone up in arms or feeling more of a sense of urgency as hackers get more sophisticated with their methods? Healthcare provid...

Pharmaceutical Companies Need to Rethink Their Approach to Financial Compliance

Written by:

Imagine your pharmaceutical company signs a multi-million-dollar contract with a research organization to do clinical trials for a new therapy. After the project gets underway, you happen to find out that the individuals who own the company are under...

Balancing Data Security with Member Engagement

Written by:

We are living in a time where members have more access to their personal health information than ever as a result of digital health initiatives to improve portal adoption.  As members are taking more control of their health, there is also an increas...
Pages: 1 2 3