Author Archives: Onsite Computing, Inc.

A brief guide to social media and HIPAA

Social media has become a vital tool for healthcare organizations, allowing them to reach patients, share information, and build strong brand identities. However, social media can easily collide with the Health Insurance Portability and Accountability Act (HIPAA), putting patient privacy at risk. To keep your healthcare organization on the right side of compliance, it’s essential […]

Responsible social media in healthcare: Preventing HIPAA violations

For healthcare organizations, social media provides a valuable platform for promoting services and connecting with patients. However, it can also easily facilitate a breach of Health Insurance Portability and Accountability Act (HIPAA) regulations, incurring serious penalties. Read this blog post to better understand the interactions between social media and HIPAA: how they come into conflict […]

HIPAA and social media: Violations, consequences, and tips

Social media can help healthcare organizations advertise services, engage with patients, and foster a sense of community. However, one slip, and you might unintentionally break the Health Insurance Portability and Accountability Act (HIPAA) rules, which could lead to severe consequences. This blog post will guide you on how to stay HIPAA-compliant while effectively using social […]

New UULoader Malware Distributes Gh0st RAT and Mimikatz in East Asia

A new type of malware called UULoader is being used by threat actors to deliver next-stage payloads like Gh0st RAT and Mimikatz. The Cyberint Research Team, which discovered the malware, said it’s distributed in the form of malicious installers for legitimate applications targeting Korean and Chinese speakers. There is evidence pointing to UULoader being the […]

Cybercriminals Exploit Popular Software Searches to Spread FakeBat Malware

Cybersecurity researchers have uncovered a surge in malware infections stemming from malvertising campaigns distributing a loader called FakeBat. “These attacks are opportunistic in nature, targeting users seeking popular business software,” the Mandiant Managed Defense team said in a technical report. “The infection utilizes a trojanized MSIX installer, which executes a PowerShell script to Go to […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.