Want to Avoid Attacks? Think Like a Marine
The Marines are tough and they're smart, too. That's why they anticipate risks to stay "left of bang" on the battlefield and reduce their losses. This eBook uses similar thinking to help strengthen your phishing defense and keep your company "left of breach."
Phishing...
Almost 6 million Americans had their patient records stolen or exposed in healthcare breaches over the past year with ransomware being a frequent and highly effective form of attack. Recent successful variants such as SamSam and Ryuk have caused an estimated $7 million in damages alone.
Clearly, ransomware is a...
Many medical device makers appear to building better cybersecurity into their products, but some manufacturers are still avoiding fixing vulnerabilities in legacy devices that pose potential safety risks, says security researcher Billy Rios, who discusses the latest flaws in some Medtronic cardiac devices.
As the HIPAA security rule turns 20, it's time for regulators to make updates reflecting the changing cyberthreat landscape and technological evolution that's happened over the past two decades, says security expert Tom Walsh.
Finding out your healthcare organization has been breached can be devastating news. Knowing how to deal with an intruder who has broken through your cyber defenses can be even more challenging.
This whitepaper offers practical steps healthcare IT and security professionals should take after a cyberattack occurs....
The year's CrowdStrike® Global Threat Report offers one of the industry's most comprehensive reports on today's most damaging cyberattacks and dangerous adversaries. It contains valuable insights into the evolving threat landscape and includes recommendations that will help you be better prepared for the security...
With the advent of technology in personal healthcare - Internet-connected glucose monitors, intravenous blood pressure monitoring, personal 'best friend' emotional bots - there is a lot of highly sensitive data that is rampantly traversing the airwaves. And the impact of this data getting in the wrong hands is just...
The healthcare industry is at an information security crossroads, ill-prepared for the cyberattacks increasingly targeting healthcare organizations. This session will review how the focus on security regulatory compliance has hindered the healthcare industry's ability to prevent, detect and respond to the current...
We are experiencing the Fourth Industrial Revolution, which is characterized by a range of new technologies that are fusing the physical, digital and biological worlds, impacting all industries. Healthcare is the lead industrial area in this revolution, and one of the major catalysts for change is the rapid digital...
There has been a proliferation of ransomware attacks against healthcare organizations that has ushered in a new wave of extortionware and a new generation of malware attacks. While these types of attacks are not new, they have become more insidious, sophisticated and are growing in popularity.
In order to defend...
All industries are adversely affected by the growing number of cyberattacks. But for the healthcare sector, with its large volume of structured patient information and patient care's increasing reliance on the use of electronic data - the growing sophistication of the attacks has forced it to focus on cybersecurity as...
Healthcare is in the middle of a major evolution toward digital, personalized medicine and the empowered patient. Ongoing regulatory and monetary incentive programs are driving healthcare providers to increase their EHR and E-Prescribing adoption. Additionally, the U.S. Office of the National Coordinator for Health...
In the wake of recent, massive data breaches, healthcare security teams now focus on building strong perimeter defenses and controls against inbound email threats. Internal employees are protected, but what about protecting the business's external customers?
Register for this webinar, where we'll discuss:
Why...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.