A rush by some media outlets to attribute a late-2018 alleged Ryuk ransomware infection at Tribune Publishing to North Korean attackers appears to have been erroneous, as many security experts warned at the time. Rather, cybercrime gangs appear to be using Ryuk, according to researchers at McAfee and Coveware.
The 2018 Cost of Data Breach Study: Impact of Business Continuity Management (BCM) sponsored by IBM, analyzes the financial and reputational benefits of having a BCM program in advance of a data breach.
According to the research, BCM programs can reduce the per capita cost of data breach, the mean time to identify...
Cyber-resilience combines the best practices from IT security, business continuity, and other disciplines to create a business strategy more in line with the needs and goals of today's digital business.
Download this white paper and learn:
How digital transformation is breaking down the traditional safeguards...
A business disruption caused by cyberattacks corrupting your critical data and configurations of your systems can be as damaging to an organization's financial well-being and reputation as data theft or a complete IT outage.
This can be especially true when cyberattacks involve data encryption or malware...
Protecting the Department of Health and Human Services' systems, data - and program beneficiaries - from evolving cyberthreats is a top challenge for the agency, according to a new report that recommends action items.
The challenge when designing technology for critical national infrastructure sectors is that it must be securable today and remain resilient to cyberattacks for decades to come, says cybersecurity Professor Prashant Pillai.
Organizations must carefully monitor that their business associates are adequately addressing data security to help guard against breaches, says Mark Eggleston, CISO at Health Partners Plans, who will speak on vendor risk management at ISMG's Healthcare Security Summit, to be held Nov. 13-14 in New York.
A tale of two different ransomware victims' responses: One Connecticut city says it had little choice but to pay a ransom to restore crypto-locked systems. But a North Carolina water utility hit separately says that rather than bow to criminals' demands, it will rebuild affected systems and databases.
Scotland's Arran Brewery fell victim to a Dharma Bip ransomware attack that infected its Windows domain controller and crypto-locked files and local backups, leading to the loss of three months' worth of sales data. The brewery refused to pay the attackers' two bitcoin ransom demand.
IT needs to be able to respond fast in an emergency, such as a natural disaster, or malware, security breaches, cyberattacks, and ransomware extortions that result in outages.
Download this white paper to ensure your hybrid cloud is still available in the event of catastrophe by:
Decoupling applications from...
CISOs and CIOs must ensure their organizations plan for worst-case scenarios, conducting frequent "dry runs" of disaster recovery plans, says Tonguc Yaman, CIO of SOMOS, a New York Community Care Network, who formerly served as deputy CIO of Bellevue Hospital.
In today's environment, where government is run by technology, business continuity is a necessity.
This white paper discusses a new active/active stretched cluster technology that allows government agencies to achieve the highest levels of business continuity without the costs and complexities that have typically...
Can you afford to lose $740,357? That's the average cost of a data center outage, according to the Ponemon Institute.* That's just one reason that IT needs to be able to respond fast in an emergency, such as a natural disaster, DNS attack, ransomware, malware, or any other type of outage. With a growing number of data...
This case study illustrates how Digital Shadows helped the head of threat intelligence at a bank discover a user on the dark web claiming to be a bank employee selling access to high net worth individual's accounts. The fact that the seller appeared to be an employee, this threat was of heightened priority to this...
Technology, regulations and customer expectations all have evolved, but what does this mean for how organizations secure identities?
This evolution has proven to be a two-sided coin, particularly for financial institutions. It's not only allowing financial institutions to offer new, innovative products where...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.