Security
SPONSORED
The new mantra for healthcare in the Information Age could easily parallel security in today’s evolving cybercrime era – it’s about people.
The agency currently uses a dozen approved cloud service providers.
Penn Medicine security exec: Advanced threat protection vendors and hospitals must join forces to f…
To fend off increasingly sophisticated ransomware, phishing and other malicious attacks, infosec professionals and software vendors can tap into ATD tools to more effectively share threat information.
Email archives, business documents, intellectual property and source code are in hackers’ crosshairs.
The self-extracting variant, which links to a Dropbox account run by hackers, will shut down when certain programs are found on the system.
When servers are configured to allow anonymous access, hackers can infiltrate an organization and launch a cyberattack.
Urology Austin, a healthcare provider with locations throughout central Texas, began notifying its patients March 24 that hackers may have accessed patient records that included names, dates of birth, addresses, medical information and Social Security numbers.
"Any time we contract with any vendor on any of the relationships, then we go through the analysis: Are they a business associate or not?" said Beaufort Memorial Hospital CIO Ed Ricks.
The former director of the conservative Heritage Foundation think tank is a staunch opponent of civil rights for transgender people, whom he'll be tasked to protect as OCR director.
The good news? Hacking was down and only comprised 12 percent of reported incidents during the last month.