Skip to main content

Privacy & Security

Privacy & Security
By Bill Siwicki | 11:28 am | June 16, 2017
Spam filters are one thing, but if a hacker takes over an e-mail domain, spoofing and phishing can become precise and dangerous. But there are tools available that can help.
Electronic Health Records
By Gus Venditto | 05:16 pm | June 15, 2017
The ride-sharing service is charged with defaming a woman and obtaining her records without authorization.
data security
By Jessica Davis | 01:59 pm | June 15, 2017
More attacks are coming and they will be much worse, Greg Touhill and other security experts told a House Science subcommittee.
Mobile Health IT
By Jessica Davis | 12:36 pm | June 15, 2017
The National Security Agency said that tactics, techniques and targets of the massive ransowmare assault point to North Korea’s spy agency: the Reconnaissance General Bureau
IT Infrastructure
By Jessica Davis | 02:59 pm | June 14, 2017
About 15 percent of healthcare organizations are running on outdated systems or browsers, while 160 million computers, IoT devices and servers still have open ports, studies found.
IT Infrastructure
By Bill Siwicki | 01:56 pm | June 14, 2017
Device cybersecurity, cyber-hygiene and risk management can ensure attackers are repelled by your systems.
Connected Health
By Gus Venditto | 08:23 am | June 14, 2017
Memories of the May WannaCry attacks have started to fade but the threat to healthcare systems is not going away.
Privacy & Security
By Bill Siwicki | 04:25 pm | June 13, 2017
Hospitals not already using modern tools for two-factor authentication, such as facial recognition and push notifications, should take note of how they can block malware and other common cyberthreats.
Precision Medicine
By Jessica Davis | 03:36 pm | June 13, 2017
Privacy protections, fraud guidelines and issues with discrimination need to be addressed before widespread adoption, expert says.
Cloud Computing
By Bill Siwicki | 11:40 am | June 12, 2017
CIOs and CISOs must consider IP address probing, spear-phishing, untrained developers and more when securing cloud assets because health data needs to be at least as secure as physical assets.