Cybersecurity Blog
Browse our collection of Cybersecurity articles and resources
Medical Examiner's Office Cybersecurity Checklist: Essential Controls to Protect Case Data, PHI, and Evidence Systems
Your medical examiner’s office handles sensitive case files, Protected Health Information (PHI), ...
Healthcare Security Awareness for Beginners: A Simple Guide to Protecting Patient Data
Understanding Healthcare Data Security. Healthcare data security protects the confidentiality, i...
Imaging Center Endpoint Protection: Protect PACS, Modalities, and Workstations from Ransomware
PACS Security Measures. Your Picture Archiving and Communication System (PACS) is the clinical n...
Emergency Medicine EHR Security Considerations: Best Practices
Emergency departments depend on rapid, uninterrupted access to clinical data. Downtime, misuse, o...
Healthcare Password Spray Case Study: Inside the Attack, Its Impact, and How to Prevent It
In this Healthcare Password Spray Case Study, you will see how a password spray attack unfolds, w...
Ransomware in Healthcare: What It Is, Recent Attacks, and How to Protect Patient Data
Overview of Ransomware in Healthcare. Ransomware in healthcare is malicious software that encryp...
XDR vs. EDR in Healthcare: Key Differences, Benefits, and How to Choose
Healthcare networks mix legacy clinical systems, modern cloud apps, and connected medical devices...
Purple Team Exercise in Healthcare: A Step-by-Step Guide
A purple team exercise blends offensive and defensive security into a collaborative, iterative pr...
Hospital-Owned Healthcare Security Staffing: How to Build and Manage an In-House Team
Building hospital-owned healthcare security staffing lets you set standards that fit your patient...
Password Management Best Practices for Imaging Centers: Protect PACS and Patient Data
Implement Multi-Factor Authentication. Where to require MFA. PACS and viewer sign-ins, radio...
Cybersecurity Plan for Medium Healthcare Organizations: Step-by-Step HIPAA-Aligned Guide & Checklist
A cybersecurity plan for medium healthcare organizations must pair HIPAA compliance with practica...
Cybersecurity Plan for Ambulatory Surgery Centers (ASCs): Step-by-Step Guide and Checklist
Identify Key Cybersecurity Components. A strong cybersecurity plan for Ambulatory Surgery Center...
Why Choose Accountable's HIPAA Training
Join thousands of organizations that trust Accountable to manage their compliance needs.
-
Fast and effective - Complete your training in minimal time
-
Engaging video content - No boring slides, just clear and practical lessons
-
Compliance-focused - Covers all key HIPAA regulations for privacy and security