Skip to main content

Security

By Beth Jones Sanborn | 04:35 pm | September 16, 2016
Hospital officials said operations are returning to normal while the cyberattack remains under FBI investigation. 
By Jessica Davis | 02:11 pm | September 16, 2016
John Riggi and Judy Selby of BDO Consulting share three steps to effective data mapping: third party assessment, an infinite response plan and a strong employee training program.
By Bill Siwicki | 04:11 pm | September 15, 2016
The program, designed to foster technology innovation in healthcare, aims to harness the industry’s $6.5 billion in start-up funding, the research and consulting giant says.
By Jessica Davis | 12:25 pm | September 14, 2016
The cybercriminal group ‘Tsar Team’ hacked the World Anti-Doping Agency’s database and leaked confidential records of Rio 2016 athletes - including Serena Williams and Simone Biles.
By Mike Miliard | 12:34 pm | September 12, 2016
Texas Health Resources has gone live with a health information exchange connecting the regions of North, South and West Texas, joining 32 other healthcare organizations in the Lone Star State.
By Jessica Davis | 08:09 am | September 09, 2016
Visual hacking’s low-tech nature flies under the radar of chief information security officers and chief privacy officers. But there are simple technology and physical fixes, Kate Borten of the Visual Privacy Advisory Council explains.
By Bill Siwicki | 04:20 pm | September 08, 2016
There were 44 reports of data breaches in August, and 233 from January through August, according to the monthly Protenus Breach Barometer.
By Mike Miliard | 03:44 pm | September 08, 2016
By combining Dragon Medical and Imprivata Cortext, the companies can offer a speaker-adaptive engine, custom vocabularies, built-in visualization, voice navigation and other features.
By Bill Siwicki | 06:02 pm | September 07, 2016
Cybercriminals are nailing healthcare with the insidious form of malware and CryptoWall is the most common type of ransomware detected in the second quarter, a new report finds.
By Bill Siwicki | 08:03 am | September 07, 2016
Healthcare organizations need to implement high-end network monitoring and anomaly detection, according to Core Security general manager Chris Sullivan.