Why hackers love PHI
Why do hackers love PHI and what can we do about it?
What constitutes PII?
NIST classifies IP Addresses, MAC Addresses, Device identifiers and other such attributes that can point to users identities as PII, and therefore subjects them to firm standards of protection.
Zero Clear Text for Cyber Resilience
Cyber-resilience in the face of Ransomware
Understanding the motives behind attacks such as ransomware helps with crafting appropriate cyber resilience strategies.