Skip to main content

Privacy & Security

By Bill Siwicki | 10:55 am | October 31, 2016
Approach cybersecurity like war. Then take a defender’s standpoint, share information whenever possible, understand what you really need to accomplish and study history.
By Jessica Davis | 04:39 pm | October 28, 2016
Internet-of-Things devices lack some of the most basic cybersecurity protocols. As a result, these devices can be weaponized en masse – and in as little as three minutes.
By Sherree Geyer | 01:18 pm | October 28, 2016
Big opportunities for efficiencies and cost savings mean cloud should become 'the archetype for small organizations' (and some big ones too).
SPONSORED
By Great Bay Software | 03:36 pm | October 27, 2016
When the network backdoor is wide open, the potential for unrestricted access to valuable patient data is practically unlimited.
SPONSORED
By Armor | 10:45 am | October 27, 2016
Simple steps to improve cyber security and stay compliant.
By Bill Siwicki | 10:27 am | October 27, 2016
Among all industries, healthcare ranks 15th out of 18 in social engineering for security, suggesting a security awareness problem among healthcare professionals that could be putting millions of patients at risk.
By Tom Sullivan | 09:58 pm | October 26, 2016
They’re not just TV stars. Robert Herjavec is a renowned security expert and Kevin O’Leary an innovation specialist with experience in healthcare dating back decades. 
By Jessica Davis | 01:47 pm | October 26, 2016
MedSec and Muddy Waters reveal that security vulnerabilities can weaponize pacemakers.
By Bernie Monegain | 12:17 pm | October 26, 2016
Cyber initiative at the HIMSS Innovation Center in Cleveland meshes security and innovation, officials said.
By Jessica Davis | 02:02 pm | October 25, 2016
Five employees responded to the phishing emails, which allowed hackers unauthorized accessed, officials said.