Skip to main content

Security

Privacy & Security
By Bill Siwicki | 10:32 am | September 05, 2017
Cybersecurity is not computer science or computer engineering, it is a business discipline that requires people from all backgrounds and majors.
Privacy & Security
By Jessica Davis | 11:38 am | September 01, 2017
Medical Oncology Hematology Consultants discovered the cyberattack on July 7, which may have breached the records of over 19,000 patients.
Privacy & Security
By Tom Sullivan | 10:33 am | September 01, 2017
Ropemaker, IRS and FBI phishing scams, leaked IoT creds and more arose during the month that just closed.
Privacy & Security
By Bill Siwicki | 03:37 pm | August 31, 2017
The aggressive attack uses impersonation and advanced threats to trick email recipients into downloading an attachment labeled ‘payment,’ which will encrypt an organization’s files.
Privacy & Security
By Jessica Davis | 02:18 pm | August 31, 2017
While only 744 patients were included in this month’s breach, Kaleida Health already notified 2,800 of its patients in July of a separate phishing incident.
Privacy & Security
By Jessica Davis | 01:58 pm | August 31, 2017
Researchers say it’s one of the largest malware cybercriminal attempts of the second half of 2017, and there is still no decryptor for the virus.
Privacy & Security
By Jessica Davis | 03:05 pm | August 30, 2017
The computer system of the Radiology Center from Mid-Michigan Physicians Imaging Center was breached in March, but officials say the extensive investigation delayed the breach.
Privacy & Security
By Jessica Davis | 05:00 pm | August 29, 2017
Providers can update software to ensure a hacker can’t access the device and remotely modify programming commands.
HIE
By Mike Miliard | 04:29 pm | August 29, 2017
The decentralized technology offers stronger privacy protections than existing platforms since its multiple servers are less vulnerable to attack than a single access point.
Privacy & Security
By Jessica Davis | 04:02 pm | August 29, 2017
Exodus comes after a report found major vulnerabilities in the government’s readiness to protect critical systems from cyber attacks.