Today's targeted threats are often multi-vectored and exploit unknown vulnerabilities - their sophistication defying typical signature-only based inspection. Whether APTs or client-side threats, they use evasive techniques to penetrate our organizations, often purporting to be or riding on applications and exploiting...
Text-messaging by physicians and other clinicians poses serious potential patient privacy risks. But with security controls in place, some healthcare organizations are giving a green light to texting in certain circumstances.
Both candidates have made fleeting references to cybersecurity during the presidential campaign, but neither has addressed the matter in detail. How different would a President Romney be from a second-term President Obama?
It's difficult to know where sensitive patient information may be lurking in user files. But some healthcare organizations are finding ways to detect where the information resides so they can protect it. Find out how.
Connecticut is working to improve its cyber incident response, including updating its breach notification law and enacting a privacy task force. Connecticut Attorney General George Jepsen explains why.
The late summer breach wasn't discovered until Oct. 10, but the state waited more than two weeks before notifying the public. Gov. Nikki Haley says the state will provide taxpayers with one year of credit monitoring and identity protection.
Data theft continues to increase in frequency. Threats from employee theft, employee negligence, and third party entities such as consultants, contractors, processors, marketers and other outside professionals put your company in danger of a data breach.
In today's workplace data breaches are at their highest...