HYAS Blog https://www.hyas.com/blog HYAS is the world's leading authority on pre-zero-day cybersecurity risk. HYAS provides the industry’s first security solution that integrates into existing security frameworks and enables enterprises to detect and mitigate cyber risks before attacks happen and identify the bad actors behind them. en-us Wed, 16 Nov 2022 19:27:14 GMT 2022-11-16T19:27:14Z en-us WOW! We Have a Problem… https://www.hyas.com/blog/wow-problem-healthcare-medical-cyber-vulnerabilities <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/wow-problem-healthcare-medical-cyber-vulnerabilities" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/HYA2206_May%20Social%20Posts.jpg" alt="WOW! We Have a Problem…" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><em>The medical industry is especially vulnerable to attacks stemming from workstations on wheels. In this post, we will lay out the problems they introduce and tell you how to address them.</em></p> <p style="line-height: 1;"><em></em></p> <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/wow-problem-healthcare-medical-cyber-vulnerabilities" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/HYA2206_May%20Social%20Posts.jpg" alt="WOW! We Have a Problem…" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><em>The medical industry is especially vulnerable to attacks stemming from workstations on wheels. In this post, we will lay out the problems they introduce and tell you how to address them.</em></p> <p style="line-height: 1;"><em></em></p> <img src="https://track.hubspot.com/__ptq.gif?a=3104948&amp;k=14&amp;r=https%3A%2F%2Fwww.hyas.com%2Fblog%2Fwow-problem-healthcare-medical-cyber-vulnerabilities&amp;bu=https%253A%252F%252Fwww.hyas.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Blog visibility Healthcare Thu, 10 Nov 2022 17:31:16 GMT INFO@HYAS.COM (HYAS) https://www.hyas.com/blog/wow-problem-healthcare-medical-cyber-vulnerabilities 2022-11-10T17:31:16Z Putting an End to Emotet: Measuring the Real-World Efficacy of Protective DNS Providers https://www.hyas.com/blog/stopping-emotet-measuring-efficacy-protective-dns-providers <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/stopping-emotet-measuring-efficacy-protective-dns-providers" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/iStock-1197640540.jpg" alt="Putting an End to Emotet: Measuring the Real-World Efficacy of Protective DNS Providers" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><em>We compared HYAS with other top protective DNS providers to find out which one was able to detect and block the most domains associated with an Emotet attack.</em></p> <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/stopping-emotet-measuring-efficacy-protective-dns-providers" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/iStock-1197640540.jpg" alt="Putting an End to Emotet: Measuring the Real-World Efficacy of Protective DNS Providers" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><em>We compared HYAS with other top protective DNS providers to find out which one was able to detect and block the most domains associated with an Emotet attack.</em></p> <img src="https://track.hubspot.com/__ptq.gif?a=3104948&amp;k=14&amp;r=https%3A%2F%2Fwww.hyas.com%2Fblog%2Fstopping-emotet-measuring-efficacy-protective-dns-providers&amp;bu=https%253A%252F%252Fwww.hyas.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Blog Threat Intelligence Emotet Thu, 06 Oct 2022 19:45:35 GMT https://www.hyas.com/blog/stopping-emotet-measuring-efficacy-protective-dns-providers 2022-10-06T19:45:35Z Kell van Daal Which Protective DNS Provider Keeps You Safest from Malware and Other Cyber Threats? https://www.hyas.com/blog/which-protective-dns-provider-keeps-you-safest-from-malware-and-other-cyber-threats <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/which-protective-dns-provider-keeps-you-safest-from-malware-and-other-cyber-threats" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/iStock-922512798.jpg" alt="Which Protective DNS Provider Keeps You Safest from Malware and Other Cyber Threats?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><em>We conducted tests using real-world malicious domains to evaluate the efficacy of HYAS Protect, along with three other top protective DNS providers</em></p> <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/which-protective-dns-provider-keeps-you-safest-from-malware-and-other-cyber-threats" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/iStock-922512798.jpg" alt="Which Protective DNS Provider Keeps You Safest from Malware and Other Cyber Threats?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><em>We conducted tests using real-world malicious domains to evaluate the efficacy of HYAS Protect, along with three other top protective DNS providers</em></p> <img src="https://track.hubspot.com/__ptq.gif?a=3104948&amp;k=14&amp;r=https%3A%2F%2Fwww.hyas.com%2Fblog%2Fwhich-protective-dns-provider-keeps-you-safest-from-malware-and-other-cyber-threats&amp;bu=https%253A%252F%252Fwww.hyas.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Blog PDNS Threat Intelligence Thu, 01 Sep 2022 18:27:28 GMT https://www.hyas.com/blog/which-protective-dns-provider-keeps-you-safest-from-malware-and-other-cyber-threats 2022-09-01T18:27:28Z Kell van Daal Making the Most of Your Flow Data with DNS Telemetry https://www.hyas.com/blog/cybersecurity-visibility-flow-data-with-dns-telemetry <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/cybersecurity-visibility-flow-data-with-dns-telemetry" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/Screen%20Shot%202022-08-09%20at%206.35.30%20PM.png" alt="Making the Most of Your Flow Data with DNS Telemetry" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="text-align: center;"><em>Monitoring DNS can help you use Netflow data more efficiently and effectively, saving both time and money.</em></p> <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/cybersecurity-visibility-flow-data-with-dns-telemetry" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/Screen%20Shot%202022-08-09%20at%206.35.30%20PM.png" alt="Making the Most of Your Flow Data with DNS Telemetry" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="text-align: center;"><em>Monitoring DNS can help you use Netflow data more efficiently and effectively, saving both time and money.</em></p> <img src="https://track.hubspot.com/__ptq.gif?a=3104948&amp;k=14&amp;r=https%3A%2F%2Fwww.hyas.com%2Fblog%2Fcybersecurity-visibility-flow-data-with-dns-telemetry&amp;bu=https%253A%252F%252Fwww.hyas.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Threat Intelligence flow data visibility Wed, 10 Aug 2022 20:26:48 GMT https://www.hyas.com/blog/cybersecurity-visibility-flow-data-with-dns-telemetry 2022-08-10T20:26:48Z Dave Mitchell How Do You Know When a Domain Is a Threat? https://www.hyas.com/blog/prioritizing-protection-scoring-cybersecurity-threats <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/prioritizing-protection-scoring-cybersecurity-threats" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/iStock-1269256867.jpg" alt="How Do You Know When a Domain Is a Threat?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><em>HYAS Protect uses advanced threat assessment to flag suspicious domains before they can strike.</em></p> <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/prioritizing-protection-scoring-cybersecurity-threats" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/iStock-1269256867.jpg" alt="How Do You Know When a Domain Is a Threat?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><em>HYAS Protect uses advanced threat assessment to flag suspicious domains before they can strike.</em></p> <img src="https://track.hubspot.com/__ptq.gif?a=3104948&amp;k=14&amp;r=https%3A%2F%2Fwww.hyas.com%2Fblog%2Fprioritizing-protection-scoring-cybersecurity-threats&amp;bu=https%253A%252F%252Fwww.hyas.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Blog Artificial Intelligence Threat Intelligence Thu, 17 Mar 2022 15:00:00 GMT https://www.hyas.com/blog/prioritizing-protection-scoring-cybersecurity-threats 2022-03-17T15:00:00Z Kyle Thompson How Does the Rapid Increase in Endpoint Devices Affect Cybersecurity? https://www.hyas.com/blog/rapid-increase-endpoint-devices-cybersecurity <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/rapid-increase-endpoint-devices-cybersecurity" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/Blog/iStock-1127447341.jpeg" alt="How Does the Rapid Increase in Endpoint Devices Affect Cybersecurity?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><em>Organizations have to manage more devices than ever before, creating vulnerabilities that can be exploited by bad actor. HYAS Protect gives you complete visibility over the entirety of your network, alerting you to suspicious traffic and shutting it down.</em></p> <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/rapid-increase-endpoint-devices-cybersecurity" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/Blog/iStock-1127447341.jpeg" alt="How Does the Rapid Increase in Endpoint Devices Affect Cybersecurity?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><em>Organizations have to manage more devices than ever before, creating vulnerabilities that can be exploited by bad actor. HYAS Protect gives you complete visibility over the entirety of your network, alerting you to suspicious traffic and shutting it down.</em></p> <img src="https://track.hubspot.com/__ptq.gif?a=3104948&amp;k=14&amp;r=https%3A%2F%2Fwww.hyas.com%2Fblog%2Frapid-increase-endpoint-devices-cybersecurity&amp;bu=https%253A%252F%252Fwww.hyas.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Blog PDNS IoT Fri, 25 Feb 2022 17:00:00 GMT david.ratner@hyas.com (David Ratner) https://www.hyas.com/blog/rapid-increase-endpoint-devices-cybersecurity 2022-02-25T17:00:00Z David Ratner Discusses the Current State of Security in Cybernews Interview https://www.hyas.com/blog/david-ratner-current-state-security-cybernews-interview <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/david-ratner-current-state-security-cybernews-interview" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/Hyass-interview.jpg" alt="David Ratner Discusses the Current State of Security in Cybernews Interview" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-size: 18px;">According to David Ratner, the CEO at HYAS, despite how strong the security solutions monitoring real-time activity&nbsp;are, numbers show that an average intrusion can last for up to 99 days before even initial detection, much less remediation. During that time, cybercriminals collect enormous amounts of sensitive information and other business-related data, explore the organization, and prepare themselves for next steps (such as encryption).</p> <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/david-ratner-current-state-security-cybernews-interview" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/Hyass-interview.jpg" alt="David Ratner Discusses the Current State of Security in Cybernews Interview" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-size: 18px;">According to David Ratner, the CEO at HYAS, despite how strong the security solutions monitoring real-time activity&nbsp;are, numbers show that an average intrusion can last for up to 99 days before even initial detection, much less remediation. During that time, cybercriminals collect enormous amounts of sensitive information and other business-related data, explore the organization, and prepare themselves for next steps (such as encryption).</p> <img src="https://track.hubspot.com/__ptq.gif?a=3104948&amp;k=14&amp;r=https%3A%2F%2Fwww.hyas.com%2Fblog%2Fdavid-ratner-current-state-security-cybernews-interview&amp;bu=https%253A%252F%252Fwww.hyas.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Thu, 10 Feb 2022 20:05:00 GMT INFO@HYAS.COM (HYAS) https://www.hyas.com/blog/david-ratner-current-state-security-cybernews-interview 2022-02-10T20:05:00Z Revising Our Approach to Cybersecurity to Face Contemporary Challenges https://www.hyas.com/blog/revising-our-approach-to-cybersecurity-to-face-contemporary-challenges <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/revising-our-approach-to-cybersecurity-to-face-contemporary-challenges" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/Revising%20Our%20Approach%20to%20Cybersecurity%20to%20Face%20Contemporary%20Challenges%20Blog.png" alt="Revising Our Approach to Cybersecurity to Face Contemporary Challenges" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>As cyber attacks become more sophisticated and prevalent, organizations simply don’t have the resources to protect everything. That’s why security prioritization is more important than ever.</p> <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/revising-our-approach-to-cybersecurity-to-face-contemporary-challenges" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/Revising%20Our%20Approach%20to%20Cybersecurity%20to%20Face%20Contemporary%20Challenges%20Blog.png" alt="Revising Our Approach to Cybersecurity to Face Contemporary Challenges" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>As cyber attacks become more sophisticated and prevalent, organizations simply don’t have the resources to protect everything. That’s why security prioritization is more important than ever.</p> <img src="https://track.hubspot.com/__ptq.gif?a=3104948&amp;k=14&amp;r=https%3A%2F%2Fwww.hyas.com%2Fblog%2Frevising-our-approach-to-cybersecurity-to-face-contemporary-challenges&amp;bu=https%253A%252F%252Fwww.hyas.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Blog Wed, 02 Feb 2022 15:24:49 GMT david.ratner@hyas.com (David Ratner) https://www.hyas.com/blog/revising-our-approach-to-cybersecurity-to-face-contemporary-challenges 2022-02-02T15:24:49Z Applying a Risk-Based Approach to Cybersecurity Compliance https://www.hyas.com/blog/applying-a-risk-based-approach-to-cybersecurity-compliance <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/applying-a-risk-based-approach-to-cybersecurity-compliance" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/Applying%20a%20Risk-Based%20Approach%20to%20Cybersecurity%20Compliance%20-%20Blog.png" alt="Applying a Risk-Based Approach to Cybersecurity Compliance" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><em>Identifying your biggest cybersecurity risks is a great place to start addressing your compliance obligations.</em></p> <p><em></em></p> <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/applying-a-risk-based-approach-to-cybersecurity-compliance" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/Applying%20a%20Risk-Based%20Approach%20to%20Cybersecurity%20Compliance%20-%20Blog.png" alt="Applying a Risk-Based Approach to Cybersecurity Compliance" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><em>Identifying your biggest cybersecurity risks is a great place to start addressing your compliance obligations.</em></p> <p><em></em></p> <img src="https://track.hubspot.com/__ptq.gif?a=3104948&amp;k=14&amp;r=https%3A%2F%2Fwww.hyas.com%2Fblog%2Fapplying-a-risk-based-approach-to-cybersecurity-compliance&amp;bu=https%253A%252F%252Fwww.hyas.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Blog Thu, 23 Dec 2021 15:15:00 GMT INFO@HYAS.COM (HYAS) https://www.hyas.com/blog/applying-a-risk-based-approach-to-cybersecurity-compliance 2021-12-23T15:15:00Z Protective DNS a Scalable, Continuous Method for Detecting Log4J Attacks https://www.hyas.com/blog/protective-dns-a-scalable-continuous-method-for-detecting-log4j-attacks <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/protective-dns-a-scalable-continuous-method-for-detecting-log4j-attacks" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/Protective%20DNS%20a%20Scalable%2c%20Continuous%20Method%20for%20Detecting%20Log4J%20Attacks%20Cover.png" alt="Protective DNS a Scalable, Continuous Method for Detecting Log4J Attacks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><em>The Log4J vulnerability is easy to exploit and hard to detect instantaneously—unless you’re monitoring your DNS traffic.</em></p> <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/protective-dns-a-scalable-continuous-method-for-detecting-log4j-attacks" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/Protective%20DNS%20a%20Scalable%2c%20Continuous%20Method%20for%20Detecting%20Log4J%20Attacks%20Cover.png" alt="Protective DNS a Scalable, Continuous Method for Detecting Log4J Attacks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><em>The Log4J vulnerability is easy to exploit and hard to detect instantaneously—unless you’re monitoring your DNS traffic.</em></p> <img src="https://track.hubspot.com/__ptq.gif?a=3104948&amp;k=14&amp;r=https%3A%2F%2Fwww.hyas.com%2Fblog%2Fprotective-dns-a-scalable-continuous-method-for-detecting-log4j-attacks&amp;bu=https%253A%252F%252Fwww.hyas.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Blog Tue, 21 Dec 2021 16:16:29 GMT https://www.hyas.com/blog/protective-dns-a-scalable-continuous-method-for-detecting-log4j-attacks 2021-12-21T16:16:29Z Dave Mitchell Staying Off the OCR Wall of Shame Means Thinking Beyond HIPAA and HITRUST https://www.hyas.com/blog/staying-off-the-ocr-wall-of-shame-means-thinking-beyond-hipaa-and-hitrust <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/staying-off-the-ocr-wall-of-shame-means-thinking-beyond-hipaa-and-hitrust" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/Staying%20Off%20the%20OCR%20Wall%20of%20Shame%20Means%20Thinking%20Beyond%20HIPAA%20and%20HITRUST%20Blog.png" alt="Staying Off the OCR Wall of Shame Means Thinking Beyond HIPAA and HITRUST" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>It’s no secret that healthcare organizations are a prime target for cybercriminals. In fact, one only has to visit <a href="https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf" style="color: #0563c1;"><span>https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf</span></a> to see how many of these organizations fell victim to breaches in the past two years alone. Unfortunately, no healthcare entity—whether a provider, plan, or business associate—is immune to this threat. Even when companies meet compliance requirements like HIPAA and certification bodies like HITRUST, breaches continue to occur. In this post, we will not go into the weeds of the various controls requirements, nor will we discuss the effectiveness of these compliance requirements. However, we will show you how HYAS Insight and HYAS Protect services can help keep your organization off the Office of Civil Rights (OCR) “Wall of Shame.”</p> <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/staying-off-the-ocr-wall-of-shame-means-thinking-beyond-hipaa-and-hitrust" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/Staying%20Off%20the%20OCR%20Wall%20of%20Shame%20Means%20Thinking%20Beyond%20HIPAA%20and%20HITRUST%20Blog.png" alt="Staying Off the OCR Wall of Shame Means Thinking Beyond HIPAA and HITRUST" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>It’s no secret that healthcare organizations are a prime target for cybercriminals. In fact, one only has to visit <a href="https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf" style="color: #0563c1;"><span>https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf</span></a> to see how many of these organizations fell victim to breaches in the past two years alone. Unfortunately, no healthcare entity—whether a provider, plan, or business associate—is immune to this threat. Even when companies meet compliance requirements like HIPAA and certification bodies like HITRUST, breaches continue to occur. In this post, we will not go into the weeds of the various controls requirements, nor will we discuss the effectiveness of these compliance requirements. However, we will show you how HYAS Insight and HYAS Protect services can help keep your organization off the Office of Civil Rights (OCR) “Wall of Shame.”</p> <img src="https://track.hubspot.com/__ptq.gif?a=3104948&amp;k=14&amp;r=https%3A%2F%2Fwww.hyas.com%2Fblog%2Fstaying-off-the-ocr-wall-of-shame-means-thinking-beyond-hipaa-and-hitrust&amp;bu=https%253A%252F%252Fwww.hyas.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Blog Wed, 01 Dec 2021 15:33:43 GMT INFO@HYAS.COM (HYAS) https://www.hyas.com/blog/staying-off-the-ocr-wall-of-shame-means-thinking-beyond-hipaa-and-hitrust 2021-12-01T15:33:43Z Blocking More Doesn’t Mean Better https://www.hyas.com/blog/blocking-more-doesnt-mean-better <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/blocking-more-doesnt-mean-better" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/Blocking%20More%20Doesn%E2%80%99t%20Mean%20Better.png" alt="Blocking more doesn't mean better" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Everyone knows that proper cybersecurity hygiene means allowing good content and traffic in and keeping bad content and traffic out. Therefore, when comparing solutions, the one that blocks more is better, right?&nbsp;</p> <p>Wrong.</p> <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/blocking-more-doesnt-mean-better" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/Blocking%20More%20Doesn%E2%80%99t%20Mean%20Better.png" alt="Blocking more doesn't mean better" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Everyone knows that proper cybersecurity hygiene means allowing good content and traffic in and keeping bad content and traffic out. Therefore, when comparing solutions, the one that blocks more is better, right?&nbsp;</p> <p>Wrong.</p> <img src="https://track.hubspot.com/__ptq.gif?a=3104948&amp;k=14&amp;r=https%3A%2F%2Fwww.hyas.com%2Fblog%2Fblocking-more-doesnt-mean-better&amp;bu=https%253A%252F%252Fwww.hyas.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Blog Tue, 19 Oct 2021 14:15:00 GMT david.ratner@hyas.com (David Ratner) https://www.hyas.com/blog/blocking-more-doesnt-mean-better 2021-10-19T14:15:00Z Your Existing Security and Visibility is Not Enough https://www.hyas.com/blog/your-existing-security-and-visibility-is-not-enough <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/your-existing-security-and-visibility-is-not-enough" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/Your%20Existing%20Security%20and%20Visibility%20is%20Not%20Enough.png" alt="Your Existing Security and Visibility is Not Enough" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>I’m sure that you’ve purchased and utilized a variety of solutions in your security stack today. You may think that your combined solution is “good enough” and that it gives you the visibility and protection you need to properly execute, drive the company full forward at the speed of business, and put on the brakes when needed to address key risks and threats before they cripple the organization.</p> <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/your-existing-security-and-visibility-is-not-enough" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/Your%20Existing%20Security%20and%20Visibility%20is%20Not%20Enough.png" alt="Your Existing Security and Visibility is Not Enough" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>I’m sure that you’ve purchased and utilized a variety of solutions in your security stack today. You may think that your combined solution is “good enough” and that it gives you the visibility and protection you need to properly execute, drive the company full forward at the speed of business, and put on the brakes when needed to address key risks and threats before they cripple the organization.</p> <img src="https://track.hubspot.com/__ptq.gif?a=3104948&amp;k=14&amp;r=https%3A%2F%2Fwww.hyas.com%2Fblog%2Fyour-existing-security-and-visibility-is-not-enough&amp;bu=https%253A%252F%252Fwww.hyas.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Blog Fri, 15 Oct 2021 17:11:56 GMT david.ratner@hyas.com (David Ratner) https://www.hyas.com/blog/your-existing-security-and-visibility-is-not-enough 2021-10-15T17:11:56Z Protect Your Network With DNS Data https://www.hyas.com/blog/protect-your-network-with-dns-data <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/protect-your-network-with-dns-data" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/Featured%20Blog%20Image.png" alt="Protect Your Network With DNS Data" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><em>Protect Your Network With DNS Data</em> was originally featured in the TAG Cyber Security Annual (Q3 2021), which also <a href="https://www.hyas.com/newsroom/hyas-named-2021-tag-cyber-distinguished-vendor">named HYAS as a Distinguished Vendor for 2021</a>. Join HYAS CEO, David Ratner for <span>an exclusive interview where he&nbsp;</span><span>shares his thoughts on why the NSA and CISA recently issued guidance on the importance of DNS data. </span></p> <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/protect-your-network-with-dns-data" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/Featured%20Blog%20Image.png" alt="Protect Your Network With DNS Data" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><em>Protect Your Network With DNS Data</em> was originally featured in the TAG Cyber Security Annual (Q3 2021), which also <a href="https://www.hyas.com/newsroom/hyas-named-2021-tag-cyber-distinguished-vendor">named HYAS as a Distinguished Vendor for 2021</a>. Join HYAS CEO, David Ratner for <span>an exclusive interview where he&nbsp;</span><span>shares his thoughts on why the NSA and CISA recently issued guidance on the importance of DNS data. </span></p> <img src="https://track.hubspot.com/__ptq.gif?a=3104948&amp;k=14&amp;r=https%3A%2F%2Fwww.hyas.com%2Fblog%2Fprotect-your-network-with-dns-data&amp;bu=https%253A%252F%252Fwww.hyas.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Blog Fri, 23 Jul 2021 17:16:12 GMT INFO@HYAS.COM (HYAS) https://www.hyas.com/blog/protect-your-network-with-dns-data 2021-07-23T17:16:12Z When You’re Getting Clobbered, Shift Your Approach or Suffer Defeat https://www.hyas.com/blog/when-youre-getting-clobbered-shift-your-approach-or-suffer-defeat <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/when-youre-getting-clobbered-shift-your-approach-or-suffer-defeat" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/When%20You%E2%80%99re%20Getting%20Clobbered,%20Shift%20Your%20Approach%20or%20Suffer%20Defeat%202.jpeg" alt="When You’re Getting Clobbered, Shift Your Approach or Suffer Defeat" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>There have been a lot of recent articles about the latest cyberattacks, but one in particular caught my eye — <a href="https://thehill.com/opinion/cybersecurity/557021-ransomware-attacks-show-were-getting-clobbered-on-cybersecurity"><em><span>Ransomware attacks show we’re getting clobbered on cybersecurity</span></em></a><em>.&nbsp;</em></p> <p>I’ve been both an athlete and a coach, and a competitive one at that. I can recall countless halftime speeches which can be summarized as “we’re not being effective, and in the second half we’re going to change...” Winning always requires being open and honest on what is working and what isn’t, being humble enough to admit that a change is required, and confident enough to drive that change full forward efficiently and effectively.</p> <div class="hs-featured-image-wrapper"> <a href="https://www.hyas.com/blog/when-youre-getting-clobbered-shift-your-approach-or-suffer-defeat" title="" class="hs-featured-image-link"> <img src="https://www.hyas.com/hubfs/When%20You%E2%80%99re%20Getting%20Clobbered,%20Shift%20Your%20Approach%20or%20Suffer%20Defeat%202.jpeg" alt="When You’re Getting Clobbered, Shift Your Approach or Suffer Defeat" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>There have been a lot of recent articles about the latest cyberattacks, but one in particular caught my eye — <a href="https://thehill.com/opinion/cybersecurity/557021-ransomware-attacks-show-were-getting-clobbered-on-cybersecurity"><em><span>Ransomware attacks show we’re getting clobbered on cybersecurity</span></em></a><em>.&nbsp;</em></p> <p>I’ve been both an athlete and a coach, and a competitive one at that. I can recall countless halftime speeches which can be summarized as “we’re not being effective, and in the second half we’re going to change...” Winning always requires being open and honest on what is working and what isn’t, being humble enough to admit that a change is required, and confident enough to drive that change full forward efficiently and effectively.</p> <img src="https://track.hubspot.com/__ptq.gif?a=3104948&amp;k=14&amp;r=https%3A%2F%2Fwww.hyas.com%2Fblog%2Fwhen-youre-getting-clobbered-shift-your-approach-or-suffer-defeat&amp;bu=https%253A%252F%252Fwww.hyas.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Blog Wed, 30 Jun 2021 13:00:00 GMT david.ratner@hyas.com (David Ratner) https://www.hyas.com/blog/when-youre-getting-clobbered-shift-your-approach-or-suffer-defeat 2021-06-30T13:00:00Z