Blog

two people working on tablet at hospital bed representing tough HIPAA password requirements in the healthcare sector

HIPAA password requirements: Best practices for compliance

The digital transformation of healthcare has brought plenty of benefits, but it’s also introduced new challenges in protecting patient information. The Health Insurance Portability and Accountability Act (HIPAA) plays a critical role in ensuring that medical data remains secure.... Read More

Doctor holding smartphone symbolizing cybersecurity in healthcare and how to prevent password sharing

Healthcare cybersecurity: How to prevent password sharing

In the high-stakes world of healthcare, where every second counts and patient care is paramount, the temptation to share passwords can seem like a minor shortcut. Professionals in the healthcare industry can find themselves navigating a delicate balance between... Read More

cyber attack incident response plan graphic - blackboard with writing: What's your plan

Cyber-attack incident response plan: Responding to a breach

Having an incident response plan is crucial in the wake of a cyber-attack because it provides a structured and systematic approach to managing the crisis. Without a plan, organizations may find themselves scrambling to respond, leading to confusion, delays,... Read More

The power of love and breached passwords

When analyzing breached passwords from the Specops database, we often turn up some surprising trends and insights. For example, the unexpected prevalence of the word “love” in passwords and its significance across different languages and cultures. We’ll take a... Read More

The future of passwords: Emerging technologies and trends

While some experts keep predicting their demise, the reality is that passwords aren’t going anywhere soon — they remain at the heart of how we secure our digital world. New security tools are emerging, but they’re working alongside passwords, not replacing... Read More