Michael K. Giannopoulos
Boston, Massachusetts, United States
6K followers
500+ connections
View mutual connections with Michael K.
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Michael K.
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View Michael K.’s full profile
-
See who you know in common
-
Get introduced
-
Contact Michael K. directly
Other similar profiles
Explore more posts
-
Michele Chubirka
Red Hat • 5K followers
Hospitals in Maine, New Hampshire limit services after cyberattack on Catholic health org https://ift.tt/Z6tLkDa Three hospitals run by Catholic healthcare organization Covenant Health are dealing with a cyberattack that forced the facilities to shut off all access to data systems. via The Record from Recorded Future News https://ift.tt/Dw2FqnY May 30, 2025 at 02:56PM
1
-
Bill L.
Iron City IT Advisors • 441 followers
🎯 Free Compliance Alignment — without the nonsense. Ever seen a compliance firm drop a 200-page “scope” doc that tells you everything you don’t need — just to run up the bill? Yeah… we’re not those guys. At Iron City IT Advisors , they take a straight-shooting, in-depth approach: ✅ Keep it in scope. ✅ Cut the fluff. ✅ Build something that actually fits your environment — not a generic checkbox factory. So we made something useful — and yep, it’s free (like actually free): 🚀 SOC 2 + NIST CSF Alignment Toolkit It’s a unified mapping where every SOC 2 Trust Services Criterion (CC1–CC9) ties directly to NIST CSF 2.0 controls — giving you one defensible, audit-ready playbook. You’ll get: 📘 A full SOC 2 → NIST CSF crosswalk ⚙️ Practical control examples you can use today 🧭 GRC implementation guidance 📊 Market insights and compliance trends Grab it here → https://lnkd.in/gdWNw52v Because good compliance doesn’t have to feel like punishment. #Cybersecurity #SOC2 #NISTCSF #Compliance #vCISO #GRC #AuditReady #IronCityITAdvisors #SecurityLeadership
4
2 Comments -
Versa Networks
96K followers
Healthcare doesn't happen only in hospitals anymore. So how do you architect security and access for an ever-changing industry? UPMC's Dan Snyder is breaking it down TODAY at Gartner IT Symposium—sharing how they rebuilt connectivity for at-home clinicians and distributed care sites while keeping latency low, security tight, and privacy non-negotiable. If you're rethinking your infrastructure or any distributed enterprise, this is the session to catch! #GartnerITSymposium #HealthcareIT #SASE #SDWAN #ZeroTrust #DataPrivacy #Telehealth #HealthcareInnovation #VersaNetworks #Cybersecurity #Versa #UPMC #ChannelPartners
25
-
Michael Mimoso
Claroty • 3K followers
Excellent new contribution to Claroty Nexus from Providence CISO Mike Ratliff on the #healthcare system's teardown of traditional #GRC. Providence's approach: GRAC — Governance, Risk, Attack Surface Management, and Compliance — is a risk-centric, threat-aligned function built for outcomes, not reporting, Ratliff writes. https://hubs.li/Q03yc3pB0
2
-
Nick F. Hernandez
ZyDoc Medical Transcription • 794 followers
CISA just added a 2021 XSS bug in OpenPLC ScadaBR (CVE-2021-26829) to the Known Exploited Vulnerabilities catalog – because threat actors are *actively* using it against industrial systems. A few things worth worrying about here: - This is “just” an XSS, but it was enough to deface an HMI, kill logs/alarms, and move quickly toward disruption. - Default creds + unpatched OT software is still a winning combo for hacktivists. - Attackers are blending commodity web tactics with ICS targets, which means the bar to impact operational tech keeps dropping. If you’re running OpenPLC ScadaBR (or any HMI/SCADA exposed to the internet), this is a good reminder to: - Patch the affected versions - Kill default credentials - Treat your HMI web layer as a real attack surface, not an afterthought Article: https://lnkd.in/eJ9XeZAT Security is a streak you can’t afford to break.
2
1 Comment -
Mike Pinch
Security Risk Advisors • 3K followers
Staying informed about emerging threats like AiTM phishing is critical. This blog provides a comprehensive overview of how attackers bypass MFA, leverage Phishing-as-a-Service platforms, and exploit session cookies. Learn how to strengthen defenses and hunt for these threats effectively.
6
-
Gerry Blass
ComplyAssistant • 2K followers
Security architecture review evaluates your technology infrastructure against security best practices and regulatory requirements. Identify opportunities for improvement and risk reduction. https://lnkd.in/eR39YM55 #SecurityArchitecture #InfrastructureReview #RiskReduction
2
-
HHM Global (Hospital & Healthcare Management)
854 followers
🚀 New York State has announced a $300 million investment to upgrade hospital IT systems, strengthen cybersecurity, and expand telehealth services across 22 projects statewide. Implication: The funding signals a push to modernise digital health infrastructure while reducing cyber risk and improving access, particularly for financially strained providers. Read more here: https://lnkd.in/gTCkp6iY #HealthcareFunding #Telehealth #HealthcareIT #HealthcareCybersecurity #HospitalIT #EHRexpansion #NewYorkHealth
-
Jorie AI
39K followers
#TrendingReads Data security remains a critical challenge for health systems. A recent Becker’s Hospital Review article reports that Cottage Hospital in New Hampshire is notifying patients after an unauthorized party accessed parts of its computer network, potentially exposing sensitive patient information. The breach was discovered in December after files were removed from a single server. While the incident did not involve the hospital’s EHR system and did not disrupt patient care, it highlights how vulnerabilities can exist outside of core clinical systems. Patient data included names and, in some cases, additional personal and medical details such as insurance information, dates of service, and treatment data. As health systems continue expanding digital operations, protecting sensitive data across all platforms has become just as important as safeguarding EHRs. Incidents like this emphasize the need for strong access controls, continuous monitoring, and employee security training across the entire technology environment. Healthcare leaders are increasingly focused on strengthening safeguards while reducing operational complexity. Simplifying workflows, limiting unnecessary system access, and standardizing processes can help reduce risk while supporting day to day operations. The takeaway is clear. Security and operational efficiency must go hand in hand. Technology strategies should prioritize reliability, accountability, and protection of patient data across every layer of the organization. At Jorie AI, we design automation with security and operational integrity in mind. By embedding intelligence directly into revenue cycle workflows and reducing manual touchpoints, we help organizations support efficiency while maintaining strong controls and oversight. 📚 Read the full article here: https://bit.ly/3ZYX9f7 🔗 Explore how Jorie AI supports secure, scalable revenue cycle operations: https://bit.ly/3ZqBuME #JorieAI #TrendingReads #AIinHealthcare #HealthTech #RevenueCycleManagement #HealthcareAutomation
12
-
HostingJournalist.com - Daily News Magazine Covering the Industry of Cloud, Hosting and Data Centers
4K followers
#CloudHosting Blue Mantis, a U.S.-based managed digital services provider known for its managed IT, cybersecurity, and cloud solutions, has acquired North Shore Data Services, a network infrastructure specialist headquartered in Kingston, New Hampshire. The acquisition is a strategic move aimed at expanding Blue Mantis’ capabilities in networking and further positioning the company to serve the growing demands of mid-market and enterprise clients across the northeastern United States. North Shore Data Services brings over three decades of technical expertise in IBM Power Systems, managed IT services, network security and compliance, and data center colocation. Under the leadership of founder and president Chuck Desjardins, the company has cultivated a diverse client base across industries and developed longstanding partnerships with leading vendors including Cisco, HPE, Dell, VMware, and Extreme Networks. With the acquisition, Blue Mantis significantly enhances its networking services portfolio, now offering comprehensive solutions such as WAN, LAN, wireless deployment, and SD-WAN. These capabilities address a critical need in today’s distributed enterprise landscape, where infrastructure modernization must be balanced with demands for security, speed, and scalability. The timing of this expansion aligns with broader industry trends. Cisco’s 2024 Global Networking Trends Report highlighted the impact of advanced networking investments, showing a 17% improvement in workforce productivity, a 10% boost in revenue, and a 19% rise in customer satisfaction for organizations that have modernized their networking stack. As businesses grapple with digital transformation, acquisitions like this reflect a strategic push by service providers to deliver the technical depth and operational support required in a hybrid and cloud-first environment. Josh Dinneen, CEO of Blue Mantis, emphasized the significance of the acquisition in strengthening the company’s value proposition. “Whether a company is building from the ground up, upgrading legacy systems, or merging IT operations post-acquisition, infrastructure must remain both secure and seamless. North Shore Data Services brings not only deep technical experience but also a strong cultural fit. Their team’s high-touch, consultative approach aligns perfectly with our customer-first ethos.” “The last three decades have brought immense changes to networking. From the cloud evolution to the emergence of generative AI technologies, our team has been at the forefront of it all,” said Chuck Desjardins, North Shore Data Services founder and president. “Joining forces with Blue Mantis will enable us to expand our mission to provide fully managed, secured and scalable network solutions to customers with greater reach and resources. Together, we can simplify clients’ complex IT challenges.” Beyond the technical synergies, the deal presents strong business alignment…
-
Deckard Technologies
2K followers
In case you missed it, New York counties are quickly implementing the state's new STR law - and Deckard Technologies is partnering with NYSAC to provide the tools and data needed for effective registration and revenue collection 🛠️ With Deckard's support, counties can gain visibility and make data-informed decisions. https://hubs.li/Q03lH4CL0 #STRStrategy #DeckardTechnologies #GovTech #NYSAC #ShortTermRentals
14
1 Comment
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content