top of page

Cybersecurity at OG Healthcare

In today's digital world, businesses face an ever-increasing threat of cyberattacks. Cyber criminals are constantly developing new ways to exploit vulnerabilities in network security, making it essential for businesses to implement effective cybersecurity measures. At OG, we prioritize network security by utilizing a comprehensive array of tools to proactively monitor our network for potential threats and take swift action when needed. Our dedication to maintaining a secure network environment means we invest in industry-leading solutions to help detect and prevent cybersecurity threats before they can cause damage to our systems or compromise sensitive data.


We use a Next Generation Firewall, which is an essential tool in our cybersecurity arsenal. It provides us with advanced threat detection and prevention capabilities, including firewall policy enforcement, traffic inspection, and threat intelligence. The reporting capabilities of the firewall help us to monitor and analyze network traffic, identify potential threats, and take action to prevent them.


Microsoft Secure Score is another vital tool that we use to monitor our network for cybersecurity threats. It provides us with a comprehensive view of our organization's security posture and helps us to identify areas that require improvement. The reporting capabilities of Microsoft Secure Score help us to track our progress over time and ensure that we are continuously improving our security posture. Currently our score stands at 95% compared to the comparable companies average of 45%.


Center for Internet Security (CIS) Benchmarks for Google Chrome and Windows are security standards that provide us with a set of best practices for securing our network. The reporting capabilities of CIS Benchmarks help us to identify areas where we may be falling short of these best practices and take corrective action. OG scores are in excess of 85% for all environments.


We use a Vulnerability Management tool to identify vulnerabilities in our network infrastructure. It scans over 11,000 threat vectors on our network and identifies potential vulnerabilities that cyber criminals could exploit. If a potential threat is identified, it is immediately remediated. Currently, software has not identified any potential vulnerabilities. The reporting capabilities of the tool help us to prioritize our response to these vulnerabilities and ensure that we are addressing the most critical threats first.


We use a powerful endpoint detection and response tool that helps us to identify and respond to advanced threats at our endpoints. It uses machine learning and behavioral analysis to detect and respond to threats in real-time. The reporting capabilities of the software help us to monitor the health of our network endpoints and take action to prevent potential threats.


We use a similar detection tool for our servers. It provides us with advanced threat detection and response capabilities, including advanced threat hunting and incident response. The reporting capabilities of tool help us to identify potential threats and take immediate action to prevent them.


Microsoft Defender for Identity is a tool that we use to monitor our network for unauthorized access. It uses behavioral analysis to identify potential threats and provides us with real-time alerts when unauthorized access is detected. The reporting capabilities of Microsoft Defender for Identity help us to identify potential threats and take immediate action to prevent unauthorized access to our network.


We use an Auditing Tool that provides us with a comprehensive view of our network infrastructure. It helps us to identify potential security risks and provides us with a set of best practices for securing our network. The reporting capabilities of software help us to track our progress over time and ensure that we are continuously improving our security posture.


Microsoft Defender for Cloud Apps is a tool that we use to monitor our cloud-based applications for potential threats. It uses machine learning and behavioral analysis to detect and respond to threats in real-time. The reporting capabilities of Microsoft Defender for Cloud Apps help us to identify potential threats and take immediate action to prevent them.


We use a Phishing Attack Simulation Training tool to train our employees to identify and respond to potential cyberattacks. It provides us with simulated cyberattack scenarios that help our employees to develop the skills and knowledge they need to respond to potential threats. The reporting capabilities of the software help us to track the progress of our employees and ensure that they are continuously improving their skills and knowledge.


By leveraging this range of powerful tools and extensive automation throughout all our network management processes, we not only alleviate the workload burden on our staff but also ensure that our configurations and processes remain standardized, consistent, and accurate. This approach plays a vital role in bolstering our security posture and safeguarding against potential threats.


In conclusion, monitoring our network for cybersecurity threats is a critical part of our overall cybersecurity strategy. The tools we use play a critical role in helping us to identify and remediate potential threats. The reporting mechanisms in these tools allow us to monitor our progress, identify areas for improvement, and ensure that we are taking the necessary steps to protect our network from cyber threats.

bottom of page