At a May 25 Congressional hearing to gain input regarding a bill that would elevate the role of CISO at the Department of Health and Human Services, legislators learn that there is no one-size-fits-all pecking order for CISOs at healthcare organizations in the private sector.
Cyberattacks have gained regulatory attention worldwide. But the world doesn't need more regulation to address new threats, says Steve Durbin of the Information Security Forum. Instead, government must work more closely with the private sector.
LinkedIn failed to force all users to reset their passwords after a 2012 breach of at least 6.5 million credentials came to light. But it turns out the breach actually compromised 167 million accounts. Whoops.
Fraud, money laundering and other financial crimes are a thorn in the side of every financial institution. These activities can cut into profits, damage public trust and expose banks to massive regulatory penalties if found to be out of compliance with governmental regulations. How can banks gain a clearer view...
Synthetic identity fraud is more pervasive than most people are aware. Synthetic identities are used to obtain financial services, medical benefits, insurance and rental housing, among other things. Who else might be using your Social Security number and why?
Download this white paper to explore
What...
The complexity of fraud evolves as people embrace the conveniences of an interconnected world. From the office, to the cloud, and even on private mobile devices, anyone is a target. Cyber crime turns to sophistication for success. International teams of Hackers and Cashers manipulate systems to steal credit...
How can you cut through the web of insurance fraud and protect your organization? Download this infographic to explore:
The costly rise of fraud;
Why combatting fraud is getting harder;
The four steps to counter fraud management and help you unravel the web of fraud.
All fraud hurts, but when compared to other instruments and transaction channels, nothing has the potential to hurt like check deposit fraud. Account take over is still a major problem in the banking industry, and, with recent mass compromise events, the risk is on an upswing.
Download this infographic to...
Healthcare entities are increasingly in the crosshairs of attackers who seek to cause business disruption through evolving attacks such as ransomware. It's inevitable, frankly, that many healthcare organizations will be diagnosed with ransomware. How must they prepare? What treatment is available for when they are...
After blaming a recent spate of bank robberies on banks' poor information security practices, SWIFT has changed its tune. Now it says it wants to help financial firms spot related fraud and better share information about unfolding threats.
Neither Australia nor New Zealand currently has laws on the books requiring organizations to notify people affected by data breaches. But both countries do say they are committed to introducing that requirement.
Information Security Media Group is premiering the twice-weekly ISMG Security Report, a concise, on-demand audio report in which ISMG editors and other experts analyze the latest IT security news.
Data today is money - especially in financial services, where account data is every hacker's target. How, then, can institutions mask that data and protect it when it's in non-production environments? Mike Logan of Delphix offers new insights.
A recent study reported that the number of North American companies utilizing
SIP Trunking will grow from 38% to 58% in 2015. Yet many organizations are
falling behind the curve due to outdated and incorrect perceptions of migration
practices.But why?
The Great Barrier Myth - the notion that insurmountable...
Unified Communications & Collaboration (UC&C) is a common platform for communications, both internally and externally, within an
enterprise organization. The components included in any UC&C solution - voice, IM, video, etc. -
will vary from organization to organization. At any rate, UC&C brings all those...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.