Entries by The Editor

Improved Accessibility in Windows 11

As technology platforms stabilize after decades of constant, compatibility-breaking evolution, one fortunate result is the development and adoption of new accessibility technologies. One prominent example has been Microsoft’s Xbox Adaptive Controller, configurable set of devices explicitly designed to expand and help meet the needs of gamers with mobility and disability issues. The Adaptive Controller has […]

Have you performed your Security Risk Analysis this year?

Businesses and organizations subject to HIPAA are required to undergo an annual review of their administrative, physical, and technical safeguards for Protected Health Information. An annual Security Risk Analysis uncovers potential weaknesses in security policies, processes, and systems. After your first comprehensive SRA, each subsequent SRA will only need to be reviewed and updated to […]

‘Tis The Season – Holiday Scams

During the shift to enable hybrid and work-from-home for many businesses, cybercriminals and scammers have tried to exploit every possible vulnerability they could find. Thanks to security features included with Windows 11, the window for many of their tactics is rapidly closing. Still, some old classics manage to find their way back to our hearts […]

Multi-Factor Authentication / Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month, and this week, are highlighting multi-factor authentication as one of the most effective tools to protect patient data and your organization. Also known as two-factor authentication and two-step verification, multi-factor authentication (MFA) is a security measure that requires anyone logging into an account to navigate a two-step process to […]

Medical Device Security

This article is part of RWA’s series on the 10 Best Health Industry Cybersecurity Practices.Learn more at HHS 405(d) HICP website. Medical devices are essential to diagnostic, therapeutic and treatment practices – but as with all technologies, medical device benefits are accompanied by cybersecurity challenges. Vulnerabilities are sometimes introduced when medical devices connect to the […]

Cybersecurity Policies

This article is part of RWA’s series on the 10 Best Health Industry Cybersecurity Practices.Learn more at HHS 405(d) HICP website. Over the past decade, one of the greatest changes in addressing cyberattacks involves establishing and implementing cybersecurity policies, procedures, and processes. These policies set expectations and foster a consistent adoption of behaviors by your […]

Endpoint Protection Systems

This article is part of RWA’s series on the 10 Best Health Industry Cybersecurity Practices.Learn more at HHS 405(d) HICP website. In medicine, federal law requires an organization’s endpoints to be protected and hardened against attack. Your endpoint devices typically include desktops, laptops, mobile devices, printers, and computerized medical equipment. Federal regulations also require encrypted […]