Redox logo

Healthcare security

Blog

Mar 04, 2025

A hacker's welcome: Benefiting from the bug bounty

Being asked to embrace hackers may sound counterintuitive. However, in today's fast-paced world of healthcare security, it's a strategy worth exploring. In this episode, Redox staff security engineer Brent Ufkes offers valuable insights into the transformative power of bug bounty programs.

Blog

Feb 25, 2025

The final logoff: Streamlining secure departures

Streamlining secure departures is not just an operational necessity; it’s a pivotal component of our organization's security framework. Automating the final logoff process can transform the way employee departures are handled. Bill Easton, a skilled staff security engineer at Redox, joins to highlight practices that can enhance your security posture.

Blog

Feb 25, 2025

A Trojan horse: Hiring malicious actors

There is a new security concern that is catching many offguard: hiring malicious actors. Matt Mock, our CISO, shares that instances of fake candidates, particularly those backed by entities from countries like North Korea, are no longer a rarity.

Blog

Feb 25, 2025

Introducing "Shut the backdoor": A healthcare security podcast

Welcome to the debut episode of "Shut the backdoor," a healthcare security podcast by Redox, dedicated to protecting healthcare data one episode at a time. In this installment, host Jody Maberry chats with Redox’s own Matt Mock, CISO, and Megan McLeod, Security Engineer, about Redox's mission as a leader in healthcare interoperability, enabling providers, payers, and health tech organizations to power better care through accelerated, real-time data solutions.

Blog

Mar 20, 2024

Taking stock of healthcare security: A look at Redox’s zero trust maturity

More healthcare organizations are putting zero trust initiatives in place, but where do they fall on the maturity spectrum? Redoxer Bill Easton explain CISA’s model and share where Redox is on its zero journey, which started back in 2019.

Blog

Feb 20, 2024

Blog: Six critical data security questions

Six critical data security questions you should ask every healthcare technology vendor

How can you be sure your tech vendors will keep healthcare data safe? Our senior director of information security, Matt Mock, says to drill down into security details like their HITRUST certification, safeguard testing, and cloud hosting.

Blog

Jan 24, 2018

5 ways health systems can improve their cybersecurity in 2018

Hospitals, medical practices, and their partners have begun to find solutions to some of their biggest data security challenges. We outline five ways that health systems are beginning to defend themselves better against malicious actors.

Blog

Aug 15, 2017