First Health CEO Carter Groome Speaks at UN General Assembly Health Symposium
NEW YORK – No nation, system, or health entity is immune from the inevitable “bad day.” Our global cyber defenses are in critical condition,...
NEW YORK – No nation, system, or health entity is immune from the inevitable “bad day.” Our global cyber defenses are in critical condition,...
Lehigh Valley Health Network in Pennsylvania reached a $65 million settlement in a class-action lawsuit over data breaches of medical records of 134,000 patients....
WASHINGTON, DC – September 3, 2024 – First Health Advisory, the leading cyber resilient digital health firm, today announced the promotion of its Chief...
OneBlood, a nonprofit blood donation provider to the Southeast US, is experiencing a significant software disruption impacting its ability to ship blood products to...
Cyber resilient digital health starts with security measures that work for security teams, with measured and assessed controls. Efficacy tells us whether security measures...
In the past decade, we’ve seen a rise in the Healthcare mega-breach trend. We’ve seen a drastic increase in the number of data breaches...
Risk Management Healthcare struggles with risk management, more than almost any other sector. Most are not performing risk management, do it poorly, or think...
Most healthcare boards and executives are comfortable with addressing the question, “Is my enterprise secure?” and “Am I compliant?” Network defenders are accustomed to...
Healthcare entities are reevaluating their approach to risk assessments as looming federal baseline cybersecurity standards will require network defenders to go beyond HIPAA compliance....
A congratulations to Samantha Ng, our key cyber health recruiter, and First Health’s Employee of the Quarter! It’s with great joy that we present...
The White House recently released a proposal from Microsoft and Google that would provide limited healthcare cyber support to some of our smallest hospitals...
Cybersecurity in the Healthcare Industry Under the current state of technology access and similarly expansive threat landscape, it’s hard to fathom how quickly the...