Security
The virus first appeared in 2014, but reared its head again in August. It's since created a more sophisticated attack method, which has compromised more than 13,000 devices a day.
SPONSORED
As the threat landscape continues to evolve in tenacity and volume, healthcare is clearly in the crosshairs. With this in mind, it is critical for healthcare organizations to have stringent IT objectives that will ensure the protection of ePHI.
The pre-conference daylong event also includes sessions on the science of behavior change and preparing for the next horizon of technology, policy, and care delivery.
UPMC security chief warns that many cloud computing vendors lack ability to appropriately secure he…
John Houston calls on cloud providers to be more transparent about their security offerings and to support standards such as HITRUST.
Frank Abagnale, the renowned security expert and former confidence artist, will discuss cybersecurity issues and identity theft at HIMSS17.
The security vendor said the group behind the malware intensified its focus on healthcare organizations because the data is more valuable than other industries and providers commonly use legacy software that is not as secure as upgraded versions.
Health and Human Services Office for Civil Rights found that the university lacked a firewall, which allowed a remote access Trojan to infiltrate the network and potentially expose PHI of 1,670 individuals.
Mitch Parker comes to IU after eight years at Temple Health.
There is still no way to decrypt the virus, first discovered in March. It's now spreading via Facebook messenger.
The technology company said it will use the money to focus on secure access of health data via smartphones in developing nations.