Research shows that about half of healthcare organizations rely only on once-a-year security awareness training to educate their users about existing threats and best practices to identify and avoid these threats. For an industry swimming in sensitive information, an annual cybersecurity check-up just won’t cut it.
When it comes to medical devices deployed in clinical environments, diversity is a key factor. The reality is that not only are the medical devices manufactured by many different companies, but the underlying operating systems and software applications running on these devices are also incredibly diverse.
One might never think that Cisco would be involved with wearable tech, never mind breast cancer – but a movie? The film tells the story of a startup that seeks to bring a medical product to market - a product that is connected to the Internet and driven by big data.
Imagine for a moment you had a twin that you didn’t know about. A virtual copy of you that shopped where you shopped, read what you read, and was interested in exactly the same things you were. For all intents and purposes, this twin was you but with one big difference; this copy of you cared almost nothing about your privacy. Surprise! This copy of you exists and isn’t going away any time soon. So… now what? Well, for starters, you should read this Q&A between Jason Elrod and Sean Martin.
Reports of the death of File Transfer Protocol (FTP) have circulated ever since Debian Project announced it was sunsetting the popular and long-lived protocol on November 1 later this year. Don't believe it.
Between the massive amounts of data flowing through a company, the difficulty of managing its IT systems internally, relying on data synchronization and backup services, and the need to be budget conscious, much of this data may reside outside the firewall. But the use of convenient inward-out systems can put your company at risk if not managed properly.
Is cybersecurity insurance a necessary evil? Assuming it is, how can organizations make the most of their audit and compliance efforts to get the best coverage and rates possible? Expert Alan Zeichick speaks with experts from multiple angles to see how best to streamline the application process.
When it comes to ingesting, digesting, and applying threat intelligence in a meaningful way, it can seem like information overload. With their Threat Catalogue, HITRUST is helping the healthcare industry overcome this challenge with a complete list of security and privacy threats geared toward the threats the industry faces on a daily basis.
At the end of June 2016, bad actors published 10,000,000 stolen record for sale. Experts in cybersecurity, Andrew Komarov, Balázs Scheidler and Adam Laub, discuss findings uncovered in a recent InfoArmor report: Healthcare Under Attack: Cybercriminals Target Medical Institutions.
The 6th annual Ponemon Institute Benchmark Study on Privacy & Security of Healthcare Data has just been published, and the findings on the state of the sector’s cyber security reflect the recent stream of breaches and ransomware news.
The HITRUST 2016 conference featured great presentations, fantastic panel discussions and impressive attendance from some of the world’s top healthcare professionals. Many of the world’s top healthcare institutions were represented.
This HITRUST conference proved highly relevant and extremely valuable to all professionals concerned with the health industry’s ongoing efforts to protect health data and other personally-identifiable information from the cyber threats targeting our businesses and institutions. Read these top 20 tips to see what the attendees heard.
Their data is lucrative, often unprotected, and useful for all types of fraud including medical and identity fraud. Expert Luther Martin of HPE Security - Data Security explores these attacker gold mines.
A full five days into the ongoing MedStar Health attack, the US Department of Homeland Security and the Canadian Cyber Incident Response Centre issued a joint alert on the surge in ransomware extortion attacks.
Andrew Komarov, Brian Laing, Csaba Krasznay, John Gunn, and Carmine Clementelli dig deeper into the world or ransomware.
Two new strains of ransomware are locking down and extorting enterprises. MedStar Health is believed to be the latest victim – forced offline, all manner of patient services this week are reportedly delayed or curtailed according to unnamed employees who reported receiving ransom pop ups. MedStar is at least the fifth ransomware infection recently reported by a U.S. provider. Experts
Andrew Komarov, Brian Laing, Csaba Krasznay, Michael Magrath, and Tim McElwee talk about the challenges dealing with, and overcoming, ransomware attacks.
Henderson, KY-based Methodist Hospital has become one of the latest targets of "Locky" ransomware, which encrypts and deletes files. Victims have to either pay a ransom to regain their files, or – if they’re able – wipe systems and restore files from a quarantined, non-infected backup.
Experts Tim McElwee and Adam Laub provide their insight into this state of emergency.