Skip to main content

Security

By Bill Siwicki | 08:06 am | August 03, 2016
After detonating various strains of ransomware in its lab, security specialist Exabeam learned that because encrypting large data-sets takes time, hospitals hit with ransomware can stop it, if they act quickly.  
By Jessica Davis | 05:45 pm | August 02, 2016
A Ukrainian hacker claimed the attack on Twitter, including a screenshot of patient names, addresses, dates of birth and diagnoses.
By Jessica Davis | 11:48 am | July 27, 2016
The new collaboration seeks to end ransomware through education and decryption tools.
By Jack McCarthy | 11:45 am | July 26, 2016
The Office of the National Coordinator for Health IT opened two grants for building an Information Sharing and Analysis Organization designed to serve public health entities. 
By Jack McCarthy | 12:35 pm | July 25, 2016
ProPublica published some 300 letters that Health and Human Services Office for Civil Rights sent to healthcare providers reminding them of legal obligations, advising how to fix problems and suggesting they make voluntary changes. 
By Bernie Monegain | 11:59 am | July 25, 2016
The Office for Civil Rights said that UMMC was aware of security risks as far back as April 2005 but did not take appropriate action.
By Jack McCarthy | 10:40 am | July 25, 2016
The U.S. Bureau of Labor Statistics estimated that data breaches and hacking attacks will expand the information security professional workforce by nearly 20 percent. 
By Tom Sullivan | 02:01 am | July 25, 2016
The Office of the Inspector General posted research from 2014 so there’s reason to believe the proliferation of cyberattacks and malware could create even more downtime. OIG recommended that hospitals institute and continuously update contingency plans.
By Jeff Lagasse | 05:01 pm | July 22, 2016
Philip Esformes, Odette Barcha, and Arnaldo Carmouze were charged with conspiracy, fraud and money laundering in a wide-ranging billing scam. 
By Jack McCarthy | 11:57 am | July 21, 2016
Researchers propose tactics for preventing ransomware attacks and learning from them when they do occur, based on NIST’s cybersecurity framework.