Privacy & Security
The academic medical center turned to its inaugural Healthcare Innovation Accelerator class for new technologies and services to improve patient care.
It appears the threat actor known as ‘batwhatman’ infiltrated the developer’s SVN server and stole JAVA application codes, customer data and employee information.
Kaspersky, Trend Micro, Symantec, Cisco and Emsisoft have tools that can decrypt health data after cybercriminals encrypt it. The hitch? The technology won’t work on all ransomware strains.
CEO Kayo Elliott said that it cannot afford to spend millions of dollars and continue to deliver care services.
Reimbursement specialist R-C Healthcare Management, a business associate under HIPAA, left patient information accessible on the web for four days.
Ponemon’s 2016 Global Visual Hacking Experiment found it takes less than 15 minutes to complete an initial hack by actually eyeballing certain types of information and such attempts were successful 91 percent of the time.
The Reston, Virginia provider said patient protected health information and financial data was compromised by unauthorized third parties outside of the U.S.
The Pentagon will be looking to determine if the Army has implemented effective ways to protect its electronic health records and personally identifiable information.
Cybercriminals launching ransomware attacks – and one hacker in particular known as TheDarkOverLord – represented nearly 30 percent of the 39 data breaches in July. The average time an attack went unreported, meanwhile, was a whopping two years.
The event focuses on case studies and actionable, practical presentations geared for the audience of 350+ CISOs and other healthcare security professionals.