While companies spend huge sums of money every year to maintain a security perimeter designed to fend off cyber and insider threats, daily reports of new data breaches are raising doubts about the effectiveness of these investments. One of the biggest challenges in cyber security today is how to manage the volume,...
Attackers have healthcare entities in their crosshairs, and their favorite targets are easily compromised credentials. Tracy Hulver of Synchronoss offers new ideas for how security leaders can better manage and secure identities.
There are a wide variety of known security issues with printers and other peripheral devices. This report from Red Tiger Security shows how these devices can be exploited—and how to protect yours from threat.
Read this report to learn why:
Printers and embedded devices are often the weakest link in IT...
This research report from the Ponemon Institute provides an in-depth look into the security risks created by insecure printers and other devices, with a focus on strategies and best practices that can address these risks.
This report reveals why:
53% of IT managers realize printers are vulnerable to cyber...
Through extensive research and interviews, IDC was able to better understand the quantitative and qualitative of an organization's use of enterprise security solutions—and the business value of deploying a print security solution.
See the results.
This whitepaper explores why:
80% of companies indicate that...
A recent incident involving a vendor using a Boston clinic employee's credentials to inappropriately access patient data via a regional health information exchange illustrates the potential risks involved as the use of HIEs continues to grow.
There is no more hedging on whether ransomware incidents should be identified and treated the same way as other data breaches under the Health Insurance Portability and Accountability Act (HIPAA). The U.S. Department of Health and Human Services Office for Civil Rights (OCR) has stated that ransomware attacks...
The healthcare industry - both payers and providers - has become a favorite target of threat actors. While 2015 was named the "year of the healthcare breach," 2016 has seen its share of large-scale attacks, especially in the form of ransomware. With the U.S. Department of Health and Human Services Office for Civil...
B. Vindell Washington, M.D., the new head of the Office of the National Coordinator for Health IT, pledges that the agency's top priority of advancing standards-based interoperable, secure health data exchange will continue under his leadership. But what will happen once a new president is elected?
An undercover test by a federal watchdog agency found that previously identified process-related weaknesses persist that could potentially allow individuals to fraudulently enroll in subsidized health insurance programs via federal and state Obamacare online insurance exchanges.
Mike Magrath, Director of Business Development, VASCO Data Security discusses how SMS authentication is insecure and not a suitable authentication method in the healthcare industry today.
How do companies in the healthcare industry better manage risk and keep their most valuable data safe when stolen healthcare information commands such a high price on the dark web? Download the case study, "Proactively Challenge Cyber Threats in the Healthcare Industry," to learn how this healthcare organization...
A report analyzing the development of a defense against attackers who exploit USB devices to hack into computers leads the latest edition of the ISMG Security Report.
Cybercriminals have become dangerously savvy at leveraging the seismic technology changes occurring in the healthcare sector in order to get their hands on sensitive patient data. Medical records are more lucrative for attackers than almost any other targeted information, leaving the healthcare industry in the...
Granular patient consent policies - adopted despite HIPAA allowing certain data to be shared without explicit patient consent - can lead to less data being exchanged by healthcare entities, says researcher Julia Adler Milstein of the University of Michigan, who describes results of a new study.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.