Preparing for for new healthcare malware attacks
For all intents and purposes, the worst is yet to come with healthcare malware and virus attacks. To this point, the large majority of attacks have been a result of failed physical or administrative...
View ArticlePerspective on healthcare data breaches: Verizon report
A common refrain among those outside the healthcare industry is that healthcare has a ways to go in catching up with the enterprise in security technology. While this is largely true, Verizon’s 2012...
View ArticleMalware threats to BYOD vary by platform, says mobile study
The rise of malicious attacks directed at mobile devices should give those charged with overseeing BYOD policies pause in light of the third annual mobile threats report released by Juniper Networks...
View ArticleNIST revises malware incident prevention guide
The National Institute of Standards and Technology (NIST) updated its cross-industry “Guide to Malware Incident Prevention and Handling for Desktops and Laptops” with Revision 1 to highlight some...
View ArticleNIST provides incident response recommendations
The National Institute of Standards and Technology (NIST) recently updated its cross-industry “Guide to Malware Incident Prevention and Handling for Desktops and Laptops” with revisions to its...
View ArticleCisco 2014 Annual Security Report identifies latest trends
The recently-released Cisco 2014 Annual Security Report offers a cross-industry look at the major security concerns at the moment as well as malware and vulnerability trends that will be significant in...
View ArticleMcAfee threat report cites mobile malware, social attacks
The McAfee Labs’ 2014 Threats Predictions report spanned a number of different areas of concern in IT security. Though, by nature, a company such as McAfee makes its business on ensuring the public...
View ArticleIT expert discusses healthcare security challenges, training
With new technology infrastructure going into healthcare organizations and massive amounts of data being filtered through them, there isn’t a single set of policies or products that can help these...
View ArticleHealthcare network access data found on file-sharing website
Documents containing information on how to access healthcare provider networks were found on the file-sharing website 4shared.com, known as source of information for hackers, according to a report from...
View ArticleHeartbleed bug spreads to Cisco, Juniper network devices
A few days after the “Heartbleed bug” became public, the areas that it has affected are still being uncovered. Most recently, the Washington Post reported that large enterprise networking companies...
View ArticleVerizon 2014 Data Breach Investigations Report: Healthcare impact
Verizon released the findings of its “2014 Data Breach Investigations Report,” which reviewed and analyzed 10 years of data breach information and identified specific threat patterns. Verizon used that...
View ArticleHeartbleed bug lessons learned: Having a remediation plan
It’s been a few weeks since news of the Heartbleed bug spread near and far, but there are still significant ramifications for healthcare organizations going forward. While an exact replica of the...
View ArticleCloud data risk report: Seeing how healthcare stacks up
The quarterly Cloud Adoption and Risk (CAR) Report from Skyhigh Networks uses usage data collected from customers around the world to help explain how some enterprise organizations adopt and use cloud...
View ArticleWhy Healthcare Security Needs a New Approach to Malware
Healthcare security must be able to keep pace with the evolution of how healthcare data is used. For example, healthcare data is more valuable than ever, accounting for more than 43 percent of major...
View Article
More Pages to Explore .....