CIO Influence
CIO Influence News Security

Tausight Integrates with M365 to Reduce Patient Data Loss from Cyber Attacks

Tausight Integrates with M365 to Reduce Patient Data Loss from Cyber Attacks

Latest innovation empowers health systems to identify, detect and protect sensitive data within Exchange Online

Tausight, healthcare’s first AI-powered data security company, announced integration with Microsoft 365 that delivers real-time classification of sensitive healthcare data, including electronic protected health information (ePHI), across healthcare’s leading collaboration platform.

CIO INFLUENCE : RAG Strategies for CIO Success: Harnessing Data Retrieval Potential

On January 24, 2024, the U.S. Department of Health & Human Services (HHS) published voluntary Cybersecurity Performance Goals (CPGs) for the healthcare and public health (HPH) sector to help healthcare organizations prioritize implementation of high-impact cybersecurity practices. Included in these recommendations are controls specifically focused on email, which saw a rise in attacks of 167% last year and has now become healthcare’s second largest attack surface.

“After serving on the HHS Cybersecurity Taskforce, it’s gratifying to see the new CPGs finally emerging as a top priority of all well-run healthcare organizations,” said David Ting, Founder and CTO at Tausight. “Securing vulnerable PHI being stored and transmitted in email is a critical part of reducing the success of cyber attacks.”

Tausight’s integration with M365 allows its customers to scan and continuously monitor Exchange Online for shadow patient data to understand their risk, potential exposure during a cyber event and insights into unsecure handling of sensitive data by users. The new integration features the following capabilities:

Read More : Top Healthcare Data Management Software and Tools Every CIO Must-know

  • AI-powered classification of sensitive patient data in the entire M365 Exchange Online mail store – including messages, attachments, calendars, and tasks notes;
  • Continuous real-time classification of sensitive data that is sent and received;
  • Risk prioritization of stale data that, by elimination, quickly reduces risks and exposure;
  • Unified insights into movement of PHI and sensitive data across email and endpoints when used in conjunction with Tausight for Endpoints; and
  • Post-breach analysis and response to quickly identify what sensitive data was potentially impacted during a cyber event.

[To share your insights with us as part of editorial or sponsored content, please write to]

Related posts

AdaptiveMobile Security Publishes Blueprint for Securing 5G SMS

CIO Influence News Desk

UEI Launches New and Sustainable Whole-Home Control Solutions at CES 2022

CIO Influence News Desk

INKY and GoDaddy Announce Email Security Partnership