by Richard Lang | Nov 18, 2022 | Compliance, Cybersecurity, Patient Safety
4 minute read Richard Langwww.hstpathways.com/ Social Engineering is the #1 attack vector leading to cybersecurity breaches. However, to be successful, many of these social engineering attacks rely on a simple fact: the workstation where the end user is...
by Maura Cash, RN, BSN, CASC | Nov 9, 2022 | Just For Fun, Patient Safety
6 minute read Maura Cash, RN, BSN, CASCVice President of Clinical Strategies www.hstpathways.com/ Hi there, it’s me, Flu. I know you haven’t seen much of me in the past two years, but I wanted to let you know… I’m back! Why have we had a few...
by Richard Lang | Oct 28, 2022 | Compliance, Cybersecurity, Patient Safety
4 minute read Richard Langwww.hstpathways.com/ In previous posts, I have discussed using social engineering to persuade an unwary or untrained user to click a link, open an attachment, or provide information. What needs to be asked is, “how?”...
by Richard Lang | Sep 21, 2022 | Compliance, Cybersecurity, Patient Safety
3 minute read Richard Langwww.hstpathways.com/ As discussed in previous posts, the most common entry point into networks is Phishing/Smishing/Vishing. The malicious actor is trying to access your network and data through your employees. However, knowing this...
by Maura Cash, RN, BSN, CASC | Sep 16, 2022 | Electronic Charting, EMR/EHR, HST eChart, Patient Safety
3 minute read Maura Cash, RN, BSN, CASCVice President of Clinical Strategies www.hstpathways.com/ In a recent blog, I mentioned my obsession with Tom Cruise. But after doing some research for this article and some personal soul searching, I guarantee I would...
by Richard Lang | Aug 8, 2022 | Compliance, Cybersecurity, Patient Safety
3 minute read Richard Langwww.hstpathways.com/ Any security program has an obvious goal: protect sensitive information from unauthorized access. This is often very easy to say but more difficult to do in our interconnected, on-demand world. Why? Money! As we...