Cybersecurity

An article by author, Jessica Davis, of HIMSS Media, in yesterday's (9/5/2017) edition of Healthcare IT News, entitled, "Hackers are ransoming 26,000 unsecured MongoDB databases, security researchers find", alerts readers about specific ransomware attacks throughout the end of last year "into early 2017".

Continue Reading

An article by leading security technology journalist, Doug Drinkwater, entitled, "10 steps for a successful incident response plan", appeared in June, on the CSO (by IDG) website.

Continue Reading

An important article by author, India Ashok, entitled, "New Defray ransomware demands $5,000 from US and UK victims in highly customised attacks", appeared on August 26, on the International Business Times website. It identified a form of ransomware that, according to Ashok, "is using highly customised phishing emails to go after specific targets.

Continue Reading

An article by Rachel Z.

Continue Reading

A post today from Krishna Kurapati, CEO of qliqSOFT, Inc., a HIPAA-compliant healthcare messaging application company, is entitled, “Petya” Ransomware Attack: What You Need to Know." In the post, Kurapati describes that, "For the second time in two months, a major ransomware attack has had international implications.

Continue Reading

Hewlett Packard Enterprise (HPE) Security shared a June 2017 report from James Scott, Sr. Fellow, The Institute for Critical Infrastructure Technology (ICIT), entitled "The Necessity of Encryption for Preserving Critical Infrastructure Integrity." This powerful report states the following: "Lately, consumers have not been able to trust public or private entities to secure their data.

Continue Reading

Wannacry? OAuth?

A lot of well-known Healthcare organizations with important names have been impacted by these new threats.

If they can't defend themselves, HOW CAN YOU?

These major global cyber attacks - which occurred over the past few weeks - have occupied worldwide news headlines since. Organizations the world over, reportedly including major hospital systems, transportation providers, and telcos have been impacted. The attack has purportedly spread to over 150 countries around the world.

Continue Reading

An article in the September 26, edition of Becker's Health IT & CIO Review, by Akanksha Jayanthi, entitled, "HIMSS, CHIME seek to separate health IT, health informatics, health information management occupations" , indicates that, as the "Standard Occupation Classification Policy Committee is making revisions to its classifications for 2018, it may consider distinguishing occupations related to health informatics, health information management and health information techno

Continue Reading

In an article earlier this week from Healthcare IT News, Technology Evangelist Nathan Wenzler shares some of the key takeaways from Ponemon's recently published study of Privacy & Data Security in Healthcare.  The bottom line: Healthcare organizations must do more to protect sensitive data from breach threats.  With 91% of respondents falling victim to at least one data breach in the past 2 years, healthcare IT teams must take action.

Continue Reading

In an article yesterday from Healthcare IT News, Managing Editor Erin McCann shares the news that the National Institute of Standards and Technology (NIST) has officially released a long-awaited mobile security guide, specifically written for protecting medical data.  This 82-page book offers healthcare institutions insights into how to bolster mHealth cybersecurity.

Continue Reading

Pages

Subscribe to RSS - Cybersecurity