Skip to main content

Privacy & Security

By Jessica Davis | 03:14 pm | April 05, 2016
With the recent surge in ransomware attacks, cybersecurity is a top priority for healthcare organizations across the nation.
By Bernie Monegain | 10:46 am | April 05, 2016
The agencies are looking for ways to use a single credential for accessing health records across multiple providers. The identity solution must enhance privacy and security, be interoperable and cost-effective, officials say.
By Jessica Davis | 12:38 pm | April 04, 2016
The Samsam and Maktub Locker malicious code programs attack vulnerable patches and spread to all systems connected to a network.  
By Mike Miliard | 11:55 am | April 04, 2016
The steady drumbeat of ransomware attacks continued this past week with new reports of two hospitals forced to fight off malware that froze IT systems.
By Jack McCarthy | 10:26 am | April 04, 2016
Cybercriminals said they'll unlock the data for 45 Bitcoins, and they gave the hospital an option of paying 3 Bitcoins to unlock a single computer. 
By Jessica Davis | 05:45 pm | April 01, 2016
The United States Department of Homeland Security and the Canadian Cyber Incident Response Center issued a joint cyber alert on March 31, in response to the recent surge in ransomware attacks on hospitals and other organizations.
By Bill Siwicki | 08:58 am | April 01, 2016
Running security and IT under a CFO or chief administrative officer is bound to be problematic because they typically lack a technology background. One expert's alternative: Empower CIOs and all employees to innovate a culture of security.  
By Bernie Monegain | 10:56 am | March 31, 2016
The law firm posted a new report that includes its 7-point plan to tighten security, avoid breaches, and respond when data gets compromised.
By Jessica Davis | 12:27 pm | March 30, 2016
PowerWare is similar to the Locky virus in that it's delivered via email through a Microsoft Word document that resembles an invoice and locks down the system until the ransom is paid.
By Tom Sullivan | 10:21 am | March 30, 2016
Now the question is whether cyber criminals could someday emulate that approach to access encrypted patient data.