You Think Phishing Is Terrible? Let's Talk About Spear Phishing

Research shows that about half of healthcare organizations rely only on once-a-year security awareness training to educate their users about existing threats and best practices to identify and avoid these threats. For an industry swimming in sensitive information, an annual cybersecurity check-up just won’t cut it.

Medical Device Diversity Is A Critical Factor For Healthcare IT

When it comes to medical devices deployed in clinical environments, diversity is a key factor. The reality is that not only are the medical devices manufactured by many different companies, but the underlying operating systems and software applications running on these devices are also incredibly diverse.

Detected: A Movie, IoT, Wearable Tech, Breast Cancer, And Cisco?

One might never think that Cisco would be involved with wearable tech, never mind breast cancer – but a movie? The film tells the story of a startup that seeks to bring a medical product to market - a product that is connected to the Internet and driven by big data.

The Reports of FTP Death are Greatly Exaggerated

Reports of the death of File Transfer Protocol (FTP) have circulated ever since Debian Project announced it was sunsetting the popular and long-lived protocol on November 1 later this year. Don't believe it.

Seriously?! Can You Not Do That? Chapter III - External Internet Access

Between the massive amounts of data flowing through a company, the difficulty of managing its IT systems internally, relying on data synchronization and backup services, and the need to be budget conscious, much of this data may reside outside the firewall. But the use of convenient inward-out systems can put your company at risk if not managed properly.

How To Streamline The Cybersecurity Insurance Process

Is cybersecurity insurance a necessary evil? Assuming it is, how can organizations make the most of their audit and compliance efforts to get the best coverage and rates possible? Expert Alan Zeichick speaks with experts from multiple angles to see how best to streamline the application process.

You Can’t Change The Future, But You Can Foresee It, and Be Ready

When it comes to ingesting, digesting, and applying threat intelligence in a meaningful way, it can seem like information overload. With their Threat Catalogue, HITRUST is helping the healthcare industry overcome this challenge with a complete list of security and privacy threats geared toward the threats the industry faces on a daily basis.

Healthcare Under Attack: Report

At the end of June 2016, bad actors published 10,000,000 stolen record for sale. Experts in cybersecurity, Andrew Komarov, Balázs Scheidler and Adam Laub, discuss findings uncovered in a recent InfoArmor report: Healthcare Under Attack: Cybercriminals Target Medical Institutions.

20 Tips From HITRUST 2016

This HITRUST conference proved highly relevant and extremely valuable to all professionals concerned with the health industry’s ongoing efforts to protect health data and other personally-identifiable information from the cyber threats targeting our businesses and institutions. Read these top 20 tips to see what the attendees heard.

The Cusp of Technological Transformation

The Cusp of Technological Transformation

From the Internet of Things (IoT) to Artificial Intelligence (AI) to Augmented Reality (AR), some would argue the digital age is taking over our lives.

Expert Chuck Brooks explores the world of security and compliance as the planet tries to unlock its complete potential for medicine, manufacturing, government and everyday living.

Healthcare Held Hostage? US, Canada Issue Joint Ransomware Cyber Alert

Healthcare Held Hostage? US, Canada Issue Joint Ransomware Cyber Alert

A full five days into the ongoing MedStar Health attack, the US Department of Homeland Security and the Canadian Cyber Incident Response Centre issued a joint alert on the surge in ransomware extortion attacks.

Andrew Komarov, Brian Laing, Csaba Krasznay, John Gunn, and Carmine Clementelli dig deeper into the world or ransomware.

Outbreak! New Ransomware Variants Target Healthcare, Enterprises

Outbreak! New Ransomware Variants Target Healthcare, Enterprises

Two new strains of ransomware are locking down and extorting enterprises.  MedStar Health is believed to be the latest victim – forced offline, all manner of patient services this week are reportedly delayed or curtailed according to unnamed employees who reported receiving ransom pop ups. MedStar is at least the fifth ransomware infection recently reported by a U.S. provider. Experts

Andrew Komarov, Brian Laing, Csaba Krasznay, Michael Magrath, and Tim McElwee talk about the challenges dealing with, and overcoming, ransomware attacks.

Hospital Hit With Ransomware Contagion, Declares Internal Emergency

Hospital Hit With Ransomware Contagion, Declares Internal Emergency

Henderson, KY-based Methodist Hospital has become one of the latest targets of "Locky" ransomware, which encrypts and deletes files. Victims have to either pay a ransom to regain their files, or – if they’re able – wipe systems and restore files from a quarantined, non-infected backup.

Experts Tim McElwee and Adam Laub provide their insight into this state of emergency.