Privacy & Security
Security vendor says selling the storage unit will enable it to renew focus on core technologies for healthcare and other industries.
Even if they weren't originally looking for protected health information, we learned from the Sony attack that cybercriminals still might steal medical records while they're inside the network.
Texas Health Resources has appointed Joey Sudomir as senior vice president, innovative technology solutions and chief information officer.
The new conference will focus on cyber-security, population health and mhealth.
2015 thus far has been the year of hackers targeting the healthcare industry. And they don't appear to be slowing down. Just last week, another business associate notified individuals that their protected health information was stolen following yet another "sophisticated cyberattack."
A pair of IT security researchers have successfully designed a worm that will break into a Mac's operating system, widely considered more impenetrable than its PC counterpart. And there are huge implications for the healthcare industry.
Millions of Americans now victims of medical identity theft. Who are the criminals behind this digital era crime wave? A foray into the online black market for stolen data is a surreal experience.
Many organizations do a decent job of limiting access to data and systems for their general user population. When it comes to privileged access, however, most simply attempt to limit who has this type of access without considering some inherent risks.
A two-hospital health system in Indiana is notifying its patients that their protected health information and Social Security numbers have been compromised following a phishing attack. What's more, cyberattackers were able to swipe data unchecked for more than a year.
IT Infrastructure
It took a health insurance company almost a year to notify some 1.1 million of its members that their personal data had been swiped by hackers. What's more, the cyberattack wasn't even detected in-house.