Security experts trace many of the world's cybercrime attacks to Russia. But Russian authorities never extradite suspects, and they allow hackers to operate with impunity - if they play by some ground rules.
Adjusting risk management strategies in the aftermath of the newly discovered hacker attack on Excellus BlueCross BlueShield, as well as other recent massive cyber-attacks, will be among the hot topics discussed at the Healthcare Information Security Summit in San Francisco on Sept. 17.
Statements issued by the United States and China give a different take on cybersecurity talks scheduled to take place next week between presidents Barack Obama and Xi Jingling.
A penny saved is a penny earned, as Benjamin Franklin made familiar in Poor Richard's Almanac in 1737 - and every penny of fraud loss recovered (or better yet, avoided) goes straight to the organization's bottom line.
Present-day examples span the gamut of industries. The losses are in the billions and growing -...
Financial crimes can be complex, often spanning national borders. Combatting them involves a range of challenges, including:
Correctly identifying a bank's "customer";
Understanding hidden patterns and relationships among customers;
Covering the cost of investigations and compliance reporting;
Reducing false...
Cybersecurity is a major concern in both the private and public sectors. Targeted attacks
aimed at commercial and government organizations are on the rise, in both frequency and
severity. In recent years, threat actors have become increasingly focused on targeting corporations
to obtain sensitive information for...
As a large enterprise, you're aware of the IT security threats you face. These threats are only getting more targeted and more sophisticated. Mitigation is where enterprises need to start because prevention is significantly more effective and more cost-efficient than remediation after an attack.
The threat actors...
Virtualizing servers and desktops can bring enormous business benefits, but are virtual machines more secure than physical machines? The answer is no. While there may be a handful of attack vectors to which VMs are less prone - ransomeware threats to virtual servers, for example - VMs are just as vulnerable to most...
The National Institute of Standards and Technology is revamping its guidance on the cybersecurity of wireless infusion pumps. Gavin O'Brien of NIST's National Cybersecurity Center of Excellence describes the effort to tackle an issue that's attracting attention in the wake of a recent FDA alert.
Encryption makes the contents of email, both the message text and any
attachments, indecipherable to unauthorized individuals. Encryption can be used
in transit, so that if an unauthorized individual outside the company intercepts an
email while it moves across the Internet it cannot be read. Encryption can...
"Social media hack": these words have become synonymous with embarrassing front-page news stories
featuring major companies and figures who have fallen victim to misuse of their designated community
channels. As social media has risen in popularity, hackers have realized
that it's a ripe target.
Facebook,...
Based on various economic models, the high annual cost of cybersecurity will not interfere with the long-term productivity benefits of IT, according to a new research report.
The latest revelation of a cyber-attack against a health insurer - this time Excellus BlueCross BlueShield - illustrates why it's so important for healthcare organizations to frequently scrutinize systems for intrusions. Experts offer analysis.
A password-cracking group claims that, because of coding errors made by Ashley Madison's developers, it has been able to recover 11.2 million users' plaintext passwords. The group believes that up to 15 million of the dating site's passwords can be easily cracked.
The specter and cost of the recent high profile data theft cases has had a chilling effect -and it's just the beginning of a long-term trend. The lure of easy and substantial financial gain as well as the explosion in the number of threat actors all but guarantees that this costly trend will continue. Potentially...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.