Skip to main content

Threats, defenses, and the practical work of keeping health care organizations secure. Ransomware, phishing, endpoint security, vulnerability management, identity security, MFA, incident response, and breach analysis - with a focus on what health care IT teams can actually do about it.

From Interlock's 2.7M PHI Strike to Paper Charts at 35 Clinics

When a ransomware group encrypts your EHR, your phones, and your email at the same time, the theoretical parts of you

The Pixel Litigation Wave Hitting Healthcare

I. The Ad You Should Not Have Seen

2.7 Million Records Exposed: What the Navia Benefit Solutions Breach Means for Health Care IT

Most people have never heard of Navia Benefit Solutions. That is kind of the point.

When Your Management Plane Becomes the Attack Surface: What Health Care IT Needs to Know About the Stryker Breach

If you have been buried in tickets and missed the biggest health care technology security story of the month, here is

OCR Enforcement 2025-2026: Why Incomplete Security Risk Analyses Are Still the #1 Settlement Driver

Picture this.

The Active Directory Maintenance Task Most Hospitals Are Not Doing: Rotating the krbtgt Password

There is an account in every Active Directory domain that most administrators never think about.

Budgeting for HIPAA 2026 Compliance in Critical Access Hospitals: Realistic Line Items for a 25-Bed Facility

If you are running IT at a 25-bed Critical Access Hospital (CAH), the budget conversation about HIPAA compliance rare

Subscribe to Security