Hunting Typo Squatters
Posted May 15, 2023 by Adam Cole ‐ 4 min read
Why HITRUST Part 2
Posted April 26, 2023 by Adam Cole ‐ 3 min read
Securing Customer Images
Here's an overview of how we ensure that only authorized customers can share their code with us and how we tightly control access to these images.
Posted April 5, 2023 by Adam Cole ‐ 3 min read
Why HITRUST, Part 1
This blog series explains the reasons why LifeOmic chose to use HITRUST CSF, which is a widely recognized and comprehensive framework for managing information security risk.
Posted February 16, 2023 by Gretchen Reeves and Adam Cole ‐ 3 min read
LifeOmic Brand Abuse
It has come to our attention that LifeOmic’s name has been used in a sophisticated phishing scheme. The phishing message attempts to convince users that LifeOmic has sent them an invoice and, in order to pay the invoice, you must call the number in the email.
Posted September 23, 2022 by Adam Cole ‐ 2 min read
A Perspective of the Kaseya Incident
LifeOmic was unaffected by the Kaseya breach, but has several techniques in place that would have protected us.
Posted July 21, 2021 by Adam Cole ‐ 3 min read