The Health Information Trust Alliance (HITRUST) began a search for a secure cloud solution for their Common Security Framework (CSF) application. CSF gives businesses the structure, detail and clarity needed to more efficiently and effectively meet healthcare regulatory compliance standards, including HIPAA.
The...
While companies spend huge sums of money every year to maintain a security perimeter designed to fend off cyber and insider threats, daily reports of new data breaches are raising doubts about the effectiveness of these investments. One of the biggest challenges in cyber security today is how to manage the volume,...
This research report from the Ponemon Institute provides an in-depth look into the security risks created by insecure printers and other devices, with a focus on strategies and best practices that can address these risks.
This report reveals why:
53% of IT managers realize printers are vulnerable to cyber...
How do companies in the healthcare industry better manage risk and keep their most valuable data safe when stolen healthcare information commands such a high price on the dark web? Download the case study, "Proactively Challenge Cyber Threats in the Healthcare Industry," to learn how this healthcare organization...
A report analyzing the development of a defense against attackers who exploit USB devices to hack into computers leads the latest edition of the ISMG Security Report.
Cybercriminals have become dangerously savvy at leveraging the seismic technology changes occurring in the healthcare sector in order to get their hands on sensitive patient data. Medical records are more lucrative for attackers than almost any other targeted information, leaving the healthcare industry in the...
Healthcare is the new battleground, and the personal patient data that hospitals have readily available is more lucrative, more
comprehensive, and more attractive than retail and banking data ever was. Violations of patient privacy leave healthcare organizations vulnerable. Unfortunately, it's not a question of if...
The two biggest culprits driving security alert volume for healthcare organizations are web-based attacks and malicious insiders. But
since most hospitals cannot hire dozens of investigators to examine each and every one of these alerts, what can be done?
Download this white paper to explore
The three main...
You can't stop taking care of patients when the computers are down. Whether you are entering patients' data into their records or sending billing information to an off-site accounting service, you need that access to continue non-stop. See how you can save time and money with an active-active, highly available file...
In November and December of 2013, Cybercriminals successfully collected, staged and ultimately exfiltrated "Track 1 and 2" data related to millions of debit and credit cards. While many details remain unclear, quite a few have emerged. There has been a lot of speculation about what security products Target Corporation...
For many organizations, unsecured email represents the most prolific source of threats to the enterprise. And as the gateway for phishing and targeted attacks, these attacks can also be some of the most dangerous.
Email encryption can reduce or remove much of the risk associated with email - but the barrier for...
The unrestrained growth of digital information world-wide is making it extremely difficult for organizations to capture, manage, store, share and dispose of information in any meaningful way. With the challenges of an evolving regulatory environment and the information overload problem with management practices, many...
Social media is fast, ubiquitous, and in many cases produces measurable ROI to a business; however, it also poses significant risks that can become public and propagate virally.
This whitepaper defines a clear road map for social media compliance. Learn how to:
Meet regulatory compliance standards regarding social...
Office 365 represents Microsoft's newest foray (in quite a long line of them) into the cloud-based email and collaboration space. Yet many- if not most- Office 365 customers have found themselves requiring more granular capabilities than are available on the platform.
Read this white paper to learn...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.