3 minute read Pain Injection Procedures for ASCs: Insights and Best Practices Pain injection procedures continue to be popular in Ambulatory Surgery Centers (ASCs). Implementing such procedures in an ASC requires proper planning, preparation, and attention to detail....
4 minute read Richard Langwww.hstpathways.com/ Social Engineering is the #1 attack vector leading to cybersecurity breaches. However, to be successful, many of these social engineering attacks rely on a simple fact: the workstation where the end user is...
6 minute read Maura Cash, RN, BSN, CASCSettings Hi there, it’s me, Flu. I know you haven’t seen much of me in the past two years, but I wanted to let you know… I’m back! Why have we had a few slow years? It is most likely due to a combination...
4 minute read Richard Langwww.hstpathways.com/ In previous posts, I have discussed using social engineering to persuade an unwary or untrained user to click a link, open an attachment, or provide information. What needs to be asked is, “how?”...
3 minute read Richard Langwww.hstpathways.com/ As discussed in previous posts, the most common entry point into networks is Phishing/Smishing/Vishing. The malicious actor is trying to access your network and data through your employees. However, knowing this...
4 minute read Maura Cash, RN, BSN, CASChstpathways.com In a recent blog, I mentioned my obsession with Tom Cruise. But after doing some research for this article and some personal soul searching, I guarantee I would not go snooping in his medical record if...