
Legacy Systems and Ransomware: A Healthcare Story
While it can still feel much like the wild, wild west in the fringes of the internet, and in some aspects of healthcare, the reality is that much of the best new medical technology we are seeing has been developed using the current software available. Now, as that tech ages, it can be much easier

Staggering Up Legacy OS Hill, Staying Ahead Of Hackers With AI & IAM and More
Sometimes, it can feel like your organization is stuck in a cybersecurity rut. Other times, your organization is actually stuck, but not in any rut- just in the legacy systems that continue to work enough to not need replacing. Legacy systems are creating plenty of extra issues for those who have to keep using them

Policy vs Standards vs Procedures
Policy vs Standards vs Procedures How can we ensure that employees and individuals inside any business use technology in the manner that the organization expects? Previously, we discussed Why Every Organization Needs Information Security Policies. Any business will take steps to secure its information assets; and how that business will do so should be

Honoring Those Who Served: Happy Memorial Day from Idenhaus
Idenhaus highlighted some healthcare heroes for Nurses’ week in May, and now we want to highlight how thankful we are to all those who have served in the military, no matter how they served. For all those still serving, we thank you as well. In this edition of the newsletter, we dig into the topics

Thank You To Those Who Served, Idenhaus Celebrates Your Memory
Happy Memorial Day! Idenhaus highlighted some healthcare heroes for Nurses’ week in May, and now we want to highlight how thankful we are to all those who have served in the military, no matter how they served. For all those still serving, we thank you as well. In this edition, we explore why some of

Data Quality Issues – How They Affect Security & Your Bottom Line
by Leah Livingston Last week, we brought to light some data quality issues that are affecting all aspects of the organization. You probably asked yourself, “Wait, our poor data quality is affecting our security posture, as well as our profit margin?” The short answer is, absolutely. Remember our examples? It’s not just slow onboarding or

Nurses, Nurses, Nurses, and How Cybersecurity Is Helping (And Sometimes Hurting) Nursing Today
Most times, the real superheroes don’t wear capes. They wear PPE and help keep our bodies and minds safe from bacterial invaders and foreign objects. However, the real heroes of nursing are those who not only juggle healthcare and the ins-and-outs of healthy bodies and minds, but the ones who juggle legacy PHI systems, old

Business Email Hacking, Cyber Extortion, and Simplifying Zero-Trust One More Time
Have you ever felt like you are in the middle of a cyber storm? When a leak or a hack happens, it can feel like being in the center of a crazy cyber-nado, cyberricane, if you will. Sometimes it can feel a bit overwhelming just looking at the odds of a cyber event, even more