Sensato-Insights

Sensato Insights Blog

Cybersecurity Liability Insurance Rates are Rising - What You Can do to Lessen the Burden
Cybersecurity liability insurance premiums are rising, sometimes exponentially. You're likely wondering why, what is driving them increase and what you can do to bring your premiums down. Read below for answers to these questions and more.
Cybersecurity Awareness Month Recap - Resources and Tips
October was National Cybersecurity Awareness Month which is meant to put a spotlight and focus on cybersecurity education and taking action to protect yourself and your organization from a cyberattack. Here’s a roundup of some of the top things we shared in October.
Four New Phishing Tactics to Watch Out For
By now most healthcare organizations perform cybersecurity awareness training and their staff are on the lookout for phishing emails. Cyber attackers are getting more savvy, however and are coming up with new phishing techniques that are harder to spot. Below are some examples of these new tactics and how to spot them.
Real-time Review of Oklahoma State University Cybersecurity Breach
Healthcare organizations that are victims of a cyberattack are reported daily. Reviewing OCR findings to identify actions you can take to protect your organization from similar attacks is a good best practice. Here is a review of the OSU breach to use as an example.
Resources for Cybersecurity Awareness Month
In honor of Cybersecurity Awareness Month, we are rounding up educational resources, trainings, and some live sessions to give you tips for advancing cybersecurity at your hospital. Read here and choose your specific topic of interest.
Three Components to Build a Strong Cybersecurity Strategy for Rural Hospitals
While the immediate focus for rural hospitals is getting in front of this pandemic, there’s another unseen beast in the form of cyber criminals that are likely making plans to execute cyberattacks on hospitals. Learn three ways rural hospitals can prepare for the long-term to fight these cybercriminals.
The Last Line of Defense for Your Healthcare Network: Honeypots
Most organizations incorporate a layered cybersecurity defense. Unfortunately, the one question that defenders never ask themselves is "what is my last line of defense" or more frankly, "what if everything fails?"
Sensato Partners with Lyniate to Address the Inseparable Relationship Between Interoperability and Cybersecurity
Sensato partners with Lyniate to enhance collaboration between interoperability and cybersecurity, making healthcare organizations more efficient and secure.
Why Security Operation Centers (SOCs) Weren’t Meeting the Needs in Healthcare
Cyber criminals are getting more savvy at finding new ways to target healthcare. Healthcare needs to respond and innovate to get ahead of the cyber criminals. One way is to level up your typical Security Operations Center.
Panel Discussion Recap: How Organizations Protect the Healthcare Industry from Cyber Attacks
Recently a group of cybersecurity experts got together for a panel discussion with faculty from Rowan College at Burlington County (RCBC). The topic was how to protect the healthcare Industry from cyber-attacks.
Soft Skills Every Cybersecurity Professional Needs to Succeed in Business
There's no question cybersecurity professionals are highly skilled in the field of IT security, yet many are inadequately prepared to handle the business side of things. They have underdeveloped soft skills that are necessary for them to not only survive but actually thrive in a more business-oriented landscape.
Myths of Assessments
A hospital had recently completed a rather extensive NIST 800-53 and HIPAA cybersecurity and privacy assessment. Yet, when Sensato conducted a penetration test, the results were devastating. Read to learn more about the myths of risk assessments.
Cyber Attacks Targeting Healthcare Throughout COVID-19 Pandemic
Learn how to keep your organization protected throughout increasing cyber attacks targeting healthcare using DHS and HSCC guidelines and recommendations.
Will Recent IoMT Medical Device Concerns Make a Change in Healthcare in 2020?
Learn how drastic changes have been recently occurring in the IoMT medical device industry, and what precautions healthcare organizations must take to adjust their cybersecurity landscape to address these vulnerabilities.
Cybersecurity Capability Maturity Model
A unique capability maturity model to assist healthcare organizations of all sizes, analyze, prioritize, and improve their cybersecurity capabilities.
Small Hospital Cybersecurity: A Growing Threat and The Right Solution
Why hackers will not stop targeting critical access and rural hospitals, what to do and where to turn?
Urgent/11 – What Happened?
Learn what devices are vulnerable regarding the 11 vulnerabilities discovered in VxWorks, as well as how these attacks occur, and what you need to consider.
Medical Device Security—What You Need to Know
Cybersecurity Threats Continue to Find Vulnerabilities in Healthcare
Ransomware: To Pay or Not Pay?
Understanding the Factors and Strategy Required to Design a Policy as to Whether You Should Pay or Not Pay a Ransomware Ransom.
Sensato-TIB: DNS Attack
DHS/CISA has been tracking attacks against DNS infrastructure. These attacks have increased in frequency over the past 48-hours specifically targeting critical infrastructure sectors.
Staying Ahead as Cyberattacks Evolve
Is it possible to outpace and outsmart cyberattackers? It depends on your tech…(Hint: take a page from the attackers).
“Blurred Lines” Defining Healthcare Cybersecurity Threats in 2019
Protecting healthcare organizations with limited resources in a time of increased connectivity and BYOD requires agility, integration, organizational awareness, and innovation.
2019 Cybersecurity Guide: Aligning Threat Preparedness with Threat Landscape
Are you ready for 2019? You can bet that attackers are! Here are best practices for the emerging threat landscape in the New Year.
United We Stand. Divided We Fall
A unified threat management (UTM) approach for cybersecurity delivers operational simplicity and lower costs while providing an integrated command post to better manage assets, risk, intelligence, breach detection, analytics and counter measures.​
Cybersecurity as Automobile Product Differentiator
Safety is a big selling point. Auto manufacturers should make automobile cybersecurity a safety selling point too, as more and more internet-connected features pose increased threats.
5 Cybersecurity Keys to Protect Your Digital Assets Now
Five keys to keeping cyber attackers from finding and exploiting the chink in your cybersecurity armor.
3 Ways New FDA ISAO Will Help Healthcare Cybersecurity
Healthcare organizations, medical device manufacturers, consultancies, and related entities can participate in and benefit from new FDA ISAO partnership with Sensato
6 Weak Links in Blockchain Cybersecurity
While it’s touted as “secure,” the blockchain has some cybersecurity weak links. Organizations looking to move business to the blockchain should keep these “6 weak links” in mind.
Three Reasons Why Honeypots Should be on Your Cybersecurity Menu
Honeypots offer fast breach detection, forensics, and sweet, sweet counter measures. That’s why they’re the one thing cyber attackers fear and CISOs should be sure to include in the cybersecurity mix.
Healthcare Apps: More Consumer Control Means More IT Headaches
Consumer healthcare apps like Apple EHR, MyTeleMed, Kareo, etc, have the American Hospital Association worried. Six points of protection help safeguard critical systems and data from cyberattacks on mobile healthcare apps.
Threat Intelligence Briefing: Russian Cyberattackers Going After U.S. Critical Infrastructure
Russia has compromised hundreds of U.S. companies in the critical infrastructure sector, including electric, nuclear, aviation, manufacturing, government, and healthcare. Sensato CEO discusses the attack and how organizations can protect themselves.
Cyber Attackers Are Using AI: Are You Ready?
Like viruses that mutate and evolve to evade inoculation criminals constantly find ways to exploit AI and machine learning. AI deployment by cybersecurity experts will be essential for protecting healthcare organizations.
SamSam Calls for Good Cybersecurity Hygiene, Especially in Healthcare
SamSam ransomware has already extracted $1 million in ransom from select targets in 2018. This unique attacker relies on known vulnerabilities, making all cybersecurity practices imperative for healthcare organizations. 
Biometric Authentication
Authentication can be done three ways. It can be something you know, like a password. It can be something you have, like a keycard. Or it can be something that you are. That’s where biometrics comes in.
What Does Federal Fracas Mean for Healthcare Cybersecurity?
Each healthcare organization is responsible for protecting itself and its patients, regardless of what's happening at the federal or state level. An effective cybersecurity solution will protect patient lives from security shortcomings.
The General Data Protection Regulation
GDPR is meant to strengthen security and privacy protection for individuals. While it shares many principles from its predecessors, it's by no means a minor adaptation consisting of 11 chapters, 99 articles, and 187 recitals.
Risk Assessment is a Healthcare Cybersecurity Best Practice—Because What You Don’t Know CAN Hurt You
Risk assessment in the healthcare industry is imperative. Every health system is at risk, but a comprehensive cybersecurity solution can help to detect potential risks in your healthcare organization, and across the industry.
No Plan Survives First Contact: Is your Incident Response Plan Up to the Challenge?
After spending a considerable amount of time researching these and other challenges common to ineffective cybersecurity incident response programs, we identified components that are required for effective Incident Response Plan (IRP).
Orangeworm Threat Intelligence Briefing
This attack has gained a good amount of momentum in the past weeks. Given the tactics employed by the attackers we believe they are performing advanced staging for additional attacks and compromise.
The “Side Effect” Cyberattack Threatens Everyone: Is Your Healthcare Org Protected?
You don’t have to be the actual target. Yet you could still suffer the catastrophic damage of a cyber-munition attack.
Healthcare Cybersecurity Best Practice: Make Every Employee a Human Firewall
Ideally, every employee in a healthcare organization should be a human firewall.
Cybersecurity Incident Response Planning: Time Well Spent
Albert Einstein was supposedly once asked: If he had only one hour to save the world, how would he spend it? According to the legend, Einstein said he would take 55 minutes to define the problem and 5 minutes to solve it.
Crawl, Walk, Run to this Healthcare IT Security Best Practice: Segmentation
Segmenting may seem like an inefficient way to defend against cyberattack. Instead, it's a critical piece to creating a safer, more reliable defense against cyberattack.
Sensato’s To-Do List for Every Healthcare Organization: Cybersecurity in the Internet of Everything
“Everything that makes healthcare more efficient, every access point, new device, or algorithm, for every positive there’s a negative: risk and vulnerability.”
Knock Knock: Quantum Computing
The moment a computer is invented that is fast enough to break current cryptography, we, as cybersecurity professionals will have a whole new reality to deal with. Guess what? Quantum computing is here.
SOC Myths & Fallacies: Why Do Most Security Operations Centers Fail?
Over the course of a year long investigation, we interviewed CIO, CISO, managers, security analysts, security engineers and compliance officers. Find out what we learned.
Rationalization Creates a False Sense of Cybersecurity
Facing the audacity of evil: when it comes to information technology and medical device security for healthcare organizations, believing your perceptions—or your rationalizations—can be dangerous.
Endless, Terrifying Possibilities: This is Why You Need a Good Medical Device COP
Here’s a scary thought: There is no HIPAA-type (Health Insurance Portability and Accountability Act) regulation designed to save a human life from a medical device cyberattack.
Self-Defense & Cyberwar
As someone who may be responsible for protecting a network, facilities or people, the evolution of cyberweapons and your rights to defend yourself will become a rather critical aspect of your strategies in the coming years.
The Axis of Evil: Your Goodness Puts You at Risk
I am often asked, "what is the biggest challenge faced by a CIO or CISO trying to secure their environment?" My answer is always "they are good people."
North Korea Cyber Threat Intelligence Briefing
Sensato's North Korea Cyber Threat Intelligence Briefing examines the potential risks that North Korea possibly posses to U.S based critical infrastructure organizations.
We're Just Getting Started
When we started back in 2013, we had a simple vision—to continually innovate, to be different, to challenge the status quo, to point out that the emperor has no clothes.
Three Components to Build a Strong Cybersecurity Strategy for Rural Hospitals
While the immediate focus for rural hospitals is getting in front of this pandemic, there’s another unseen beast in the form of cyber criminals that are likely making plans to execute cyberattacks on hospitals. Learn three ways rural hospitals can prepare for the long-term to fight these cybercriminals.
The Last Line of Defense for Your Healthcare Network: Honeypots
Most organizations incorporate a layered cybersecurity defense. Unfortunately, the one question that defenders never ask themselves is "what is my last line of defense" or more frankly, "what if everything fails?"
Why Security Operation Centers (SOCs) Weren’t Meeting the Needs in Healthcare
Cyber criminals are getting more savvy at finding new ways to target healthcare. Healthcare needs to respond and innovate to get ahead of the cyber criminals. One way is to level up your typical Security Operations Center.
Soft Skills Every Cybersecurity Professional Needs to Succeed in Business
There's no question cybersecurity professionals are highly skilled in the field of IT security, yet many are inadequately prepared to handle the business side of things. They have underdeveloped soft skills that are necessary for them to not only survive but actually thrive in a more business-oriented landscape.
Cyber Attacks Targeting Healthcare Throughout COVID-19 Pandemic
Learn how to keep your organization protected throughout increasing cyber attacks targeting healthcare using DHS and HSCC guidelines and recommendations.
Cybersecurity Capability Maturity Model
A unique capability maturity model to assist healthcare organizations of all sizes, analyze, prioritize, and improve their cybersecurity capabilities.
Small Hospital Cybersecurity: A Growing Threat and The Right Solution
Why hackers will not stop targeting critical access and rural hospitals, what to do and where to turn?
“Blurred Lines” Defining Healthcare Cybersecurity Threats in 2019
Protecting healthcare organizations with limited resources in a time of increased connectivity and BYOD requires agility, integration, organizational awareness, and innovation.
2019 Cybersecurity Guide: Aligning Threat Preparedness with Threat Landscape
Are you ready for 2019? You can bet that attackers are! Here are best practices for the emerging threat landscape in the New Year.
United We Stand. Divided We Fall
A unified threat management (UTM) approach for cybersecurity delivers operational simplicity and lower costs while providing an integrated command post to better manage assets, risk, intelligence, breach detection, analytics and counter measures.​
Cybersecurity as Automobile Product Differentiator
Safety is a big selling point. Auto manufacturers should make automobile cybersecurity a safety selling point too, as more and more internet-connected features pose increased threats.
5 Cybersecurity Keys to Protect Your Digital Assets Now
Five keys to keeping cyber attackers from finding and exploiting the chink in your cybersecurity armor.
3 Ways New FDA ISAO Will Help Healthcare Cybersecurity
Healthcare organizations, medical device manufacturers, consultancies, and related entities can participate in and benefit from new FDA ISAO partnership with Sensato
6 Weak Links in Blockchain Cybersecurity
While it’s touted as “secure,” the blockchain has some cybersecurity weak links. Organizations looking to move business to the blockchain should keep these “6 weak links” in mind.
Three Reasons Why Honeypots Should be on Your Cybersecurity Menu
Honeypots offer fast breach detection, forensics, and sweet, sweet counter measures. That’s why they’re the one thing cyber attackers fear and CISOs should be sure to include in the cybersecurity mix.
Healthcare Apps: More Consumer Control Means More IT Headaches
Consumer healthcare apps like Apple EHR, MyTeleMed, Kareo, etc, have the American Hospital Association worried. Six points of protection help safeguard critical systems and data from cyberattacks on mobile healthcare apps.
Threat Intelligence Briefing: Russian Cyberattackers Going After U.S. Critical Infrastructure
Russia has compromised hundreds of U.S. companies in the critical infrastructure sector, including electric, nuclear, aviation, manufacturing, government, and healthcare. Sensato CEO discusses the attack and how organizations can protect themselves.
Cyber Attackers Are Using AI: Are You Ready?
Like viruses that mutate and evolve to evade inoculation criminals constantly find ways to exploit AI and machine learning. AI deployment by cybersecurity experts will be essential for protecting healthcare organizations.
SamSam Calls for Good Cybersecurity Hygiene, Especially in Healthcare
SamSam ransomware has already extracted $1 million in ransom from select targets in 2018. This unique attacker relies on known vulnerabilities, making all cybersecurity practices imperative for healthcare organizations. 
What Does Federal Fracas Mean for Healthcare Cybersecurity?
Each healthcare organization is responsible for protecting itself and its patients, regardless of what's happening at the federal or state level. An effective cybersecurity solution will protect patient lives from security shortcomings.
Risk Assessment is a Healthcare Cybersecurity Best Practice—Because What You Don’t Know CAN Hurt You
Risk assessment in the healthcare industry is imperative. Every health system is at risk, but a comprehensive cybersecurity solution can help to detect potential risks in your healthcare organization, and across the industry.
No Plan Survives First Contact: Is your Incident Response Plan Up to the Challenge?
After spending a considerable amount of time researching these and other challenges common to ineffective cybersecurity incident response programs, we identified components that are required for effective Incident Response Plan (IRP).
Healthcare Cybersecurity Best Practice: Make Every Employee a Human Firewall
Ideally, every employee in a healthcare organization should be a human firewall.
Cybersecurity Incident Response Planning: Time Well Spent
Albert Einstein was supposedly once asked: If he had only one hour to save the world, how would he spend it? According to the legend, Einstein said he would take 55 minutes to define the problem and 5 minutes to solve it.
Crawl, Walk, Run to this Healthcare IT Security Best Practice: Segmentation
Segmenting may seem like an inefficient way to defend against cyberattack. Instead, it's a critical piece to creating a safer, more reliable defense against cyberattack.
Sensato’s To-Do List for Every Healthcare Organization: Cybersecurity in the Internet of Everything
“Everything that makes healthcare more efficient, every access point, new device, or algorithm, for every positive there’s a negative: risk and vulnerability.”
Endless, Terrifying Possibilities: This is Why You Need a Good Medical Device COP
Here’s a scary thought: There is no HIPAA-type (Health Insurance Portability and Accountability Act) regulation designed to save a human life from a medical device cyberattack.
We're Just Getting Started
When we started back in 2013, we had a simple vision—to continually innovate, to be different, to challenge the status quo, to point out that the emperor has no clothes.
Cybersecurity Awareness Month Recap - Resources and Tips
October was National Cybersecurity Awareness Month which is meant to put a spotlight and focus on cybersecurity education and taking action to protect yourself and your organization from a cyberattack. Here’s a roundup of some of the top things we shared in October.
Real-time Review of Oklahoma State University Cybersecurity Breach
Healthcare organizations that are victims of a cyberattack are reported daily. Reviewing OCR findings to identify actions you can take to protect your organization from similar attacks is a good best practice. Here is a review of the OSU breach to use as an example.
Resources for Cybersecurity Awareness Month
In honor of Cybersecurity Awareness Month, we are rounding up educational resources, trainings, and some live sessions to give you tips for advancing cybersecurity at your hospital. Read here and choose your specific topic of interest.
Cyber Attacks Targeting Healthcare Throughout COVID-19 Pandemic
Learn how to keep your organization protected throughout increasing cyber attacks targeting healthcare using DHS and HSCC guidelines and recommendations.
Urgent/11 – What Happened?
Learn what devices are vulnerable regarding the 11 vulnerabilities discovered in VxWorks, as well as how these attacks occur, and what you need to consider.
Sensato-TIB: DNS Attack
DHS/CISA has been tracking attacks against DNS infrastructure. These attacks have increased in frequency over the past 48-hours specifically targeting critical infrastructure sectors.
Biometric Authentication
Authentication can be done three ways. It can be something you know, like a password. It can be something you have, like a keycard. Or it can be something that you are. That’s where biometrics comes in.
Risk Assessment is a Healthcare Cybersecurity Best Practice—Because What You Don’t Know CAN Hurt You
Risk assessment in the healthcare industry is imperative. Every health system is at risk, but a comprehensive cybersecurity solution can help to detect potential risks in your healthcare organization, and across the industry.
Orangeworm Threat Intelligence Briefing
This attack has gained a good amount of momentum in the past weeks. Given the tactics employed by the attackers we believe they are performing advanced staging for additional attacks and compromise.
Sensato’s To-Do List for Every Healthcare Organization: Cybersecurity in the Internet of Everything
“Everything that makes healthcare more efficient, every access point, new device, or algorithm, for every positive there’s a negative: risk and vulnerability.”
SOC Myths & Fallacies: Why Do Most Security Operations Centers Fail?
Over the course of a year long investigation, we interviewed CIO, CISO, managers, security analysts, security engineers and compliance officers. Find out what we learned.
Endless, Terrifying Possibilities: This is Why You Need a Good Medical Device COP
Here’s a scary thought: There is no HIPAA-type (Health Insurance Portability and Accountability Act) regulation designed to save a human life from a medical device cyberattack.
Self-Defense & Cyberwar
As someone who may be responsible for protecting a network, facilities or people, the evolution of cyberweapons and your rights to defend yourself will become a rather critical aspect of your strategies in the coming years.
North Korea Cyber Threat Intelligence Briefing
Sensato's North Korea Cyber Threat Intelligence Briefing examines the potential risks that North Korea possibly posses to U.S based critical infrastructure organizations.
Cybersecurity Liability Insurance Rates are Rising - What You Can do to Lessen the Burden
Cybersecurity liability insurance premiums are rising, sometimes exponentially. You're likely wondering why, what is driving them increase and what you can do to bring your premiums down. Read below for answers to these questions and more.
The Last Line of Defense for Your Healthcare Network: Honeypots
Most organizations incorporate a layered cybersecurity defense. Unfortunately, the one question that defenders never ask themselves is "what is my last line of defense" or more frankly, "what if everything fails?"
Sensato Partners with Lyniate to Address the Inseparable Relationship Between Interoperability and Cybersecurity
Sensato partners with Lyniate to enhance collaboration between interoperability and cybersecurity, making healthcare organizations more efficient and secure.
Why Security Operation Centers (SOCs) Weren’t Meeting the Needs in Healthcare
Cyber criminals are getting more savvy at finding new ways to target healthcare. Healthcare needs to respond and innovate to get ahead of the cyber criminals. One way is to level up your typical Security Operations Center.
Panel Discussion Recap: How Organizations Protect the Healthcare Industry from Cyber Attacks
Recently a group of cybersecurity experts got together for a panel discussion with faculty from Rowan College at Burlington County (RCBC). The topic was how to protect the healthcare Industry from cyber-attacks.
Soft Skills Every Cybersecurity Professional Needs to Succeed in Business
There's no question cybersecurity professionals are highly skilled in the field of IT security, yet many are inadequately prepared to handle the business side of things. They have underdeveloped soft skills that are necessary for them to not only survive but actually thrive in a more business-oriented landscape.
Myths of Assessments
A hospital had recently completed a rather extensive NIST 800-53 and HIPAA cybersecurity and privacy assessment. Yet, when Sensato conducted a penetration test, the results were devastating. Read to learn more about the myths of risk assessments.
Ransomware: To Pay or Not Pay?
Understanding the Factors and Strategy Required to Design a Policy as to Whether You Should Pay or Not Pay a Ransomware Ransom.
Staying Ahead as Cyberattacks Evolve
Is it possible to outpace and outsmart cyberattackers? It depends on your tech…(Hint: take a page from the attackers).
No Plan Survives First Contact: Is your Incident Response Plan Up to the Challenge?
After spending a considerable amount of time researching these and other challenges common to ineffective cybersecurity incident response programs, we identified components that are required for effective Incident Response Plan (IRP).
The “Side Effect” Cyberattack Threatens Everyone: Is Your Healthcare Org Protected?
You don’t have to be the actual target. Yet you could still suffer the catastrophic damage of a cyber-munition attack.
Knock Knock: Quantum Computing
The moment a computer is invented that is fast enough to break current cryptography, we, as cybersecurity professionals will have a whole new reality to deal with. Guess what? Quantum computing is here.
SOC Myths & Fallacies: Why Do Most Security Operations Centers Fail?
Over the course of a year long investigation, we interviewed CIO, CISO, managers, security analysts, security engineers and compliance officers. Find out what we learned.
Rationalization Creates a False Sense of Cybersecurity
Facing the audacity of evil: when it comes to information technology and medical device security for healthcare organizations, believing your perceptions—or your rationalizations—can be dangerous.
Self-Defense & Cyberwar
As someone who may be responsible for protecting a network, facilities or people, the evolution of cyberweapons and your rights to defend yourself will become a rather critical aspect of your strategies in the coming years.
The Axis of Evil: Your Goodness Puts You at Risk
I am often asked, "what is the biggest challenge faced by a CIO or CISO trying to secure their environment?" My answer is always "they are good people."
Four New Phishing Tactics to Watch Out For
By now most healthcare organizations perform cybersecurity awareness training and their staff are on the lookout for phishing emails. Cyber attackers are getting more savvy, however and are coming up with new phishing techniques that are harder to spot. Below are some examples of these new tactics and how to spot them.
Cyber Attacks Targeting Healthcare Throughout COVID-19 Pandemic
Learn how to keep your organization protected throughout increasing cyber attacks targeting healthcare using DHS and HSCC guidelines and recommendations.
Sensato-TIB: DNS Attack
DHS/CISA has been tracking attacks against DNS infrastructure. These attacks have increased in frequency over the past 48-hours specifically targeting critical infrastructure sectors.
The General Data Protection Regulation
GDPR is meant to strengthen security and privacy protection for individuals. While it shares many principles from its predecessors, it's by no means a minor adaptation consisting of 11 chapters, 99 articles, and 187 recitals.
We're Just Getting Started
When we started back in 2013, we had a simple vision—to continually innovate, to be different, to challenge the status quo, to point out that the emperor has no clothes.