Collaboration Under PDGM

The new year means the roll out of Patient-Driven Groupings Model (PDGM). It’s the biggest change in Medicare’s payment methodology for home healthcare since the home health Prospective Payment System (PPS) was implemented and, like PPS, me… Continue reading Collaboration Under PDGM

Hackers Come for Oil and Gas

Last month’s ransomware attack against the Mexican oil firm Pemex showed how the oil industry’s embrace of digital technology has made them a high-value target for hackers. The attack—a strain of ransomware that targets companies with… Continue reading Hackers Come for Oil and Gas

Lessons from the Louisiana Ransomware Attack

When a ransomware attack hit the state of Louisiana this week, affecting some of the state’s server computers, the government responded by taking its servers down. The move was a pre-emptive one, meant to prevent the ransomware from spreading to … Continue reading Lessons from the Louisiana Ransomware Attack

Protecting Students’ Information: Universities and Secure Communications

From financial aid information to social security numbers, students regularly share private information with their universities trusting that the university will keep it safe. That’s why it was disappointing when three major universities this sum… Continue reading Protecting Students’ Information: Universities and Secure Communications

Do VPNs Actually Protect Your Privacy?

With privacy a growing concern, it makes sense that an increasing number of people are turning to VPNs to protect themselves. VPNs are known for protecting users’ privacy by encrypting their computer traffic and routing the encrypted traffic thro… Continue reading Do VPNs Actually Protect Your Privacy?

Cybersecurity is About Teamwork, Not Individuals

More and more, businesses blame cyberattacks on “human error,” that single employee who, either accidentally or maliciously, made a decision that resulted in a security breach. You probably remember the 2017 Equifax breach that exposed over… Continue reading Cybersecurity is About Teamwork, Not Individuals

Your Network Has Been Compromised. What Now?

Security experts agree: breaches are inevitable today, which is why it’s all the more important to have an incident response plan in place. Resolving the incident when you’re still able to communicate over your main network is hard enough b… Continue reading Your Network Has Been Compromised. What Now?

Phishing Just Got More Complicated

Last month, the FBI released a note warning businesses that hackers are bypassing two-factor authentication. Two-factor authentication is usually seen as extra secure because it not only requires your username and passcode but also a unique security to… Continue reading Phishing Just Got More Complicated