Constant technological developments, global pandemics, and natural disasters are forcing healthcare organisations worldwide to reshape their entire data management process—all while avoiding falling behind on the ever-evolving regulatory requirements surrounding data security.
So, how can you navigate this...
Your security posture and company’s profitability are more closely linked than you may realize. About 93% of external organizations reported malicious actors attempting to impact not only data backups but your organization as a whole, and 73% saw attackers be at least partially successful.
Despite...
In 2022, a typical organization secured 227 BETB of data with averages of 155 BETB on-premises, 63 BETB for cloud, and 10 TB for SaaS.1 Given this data volume, how can you identify risks to all of it?
Watch this webinar to learn how to:
Determine the scope of ransomware attacks using machine learning to detect...
Despite the beating new publicly traded security companies have taken during the economic downturn, Rubrik is looking to test its luck in the public market. Reuters reported Monday the firm is working with Goldman Sachs, Barclays and Citigroup in preparation for an IPO that could take place in 2024.
The nature of hybrid infrastructure presents a host of security challenges. Hybrid architectures require an unprecedented level of interconnectivity as, essentially, everything connects to everything else.
So, how do you secure infrastructure with an almost exponential growth in complexity?
We’ll show you. Our...
Ransomware attacks grew by 80% last year, according to Zscaler's ThreatLabz findings. Further, phishing attacks increased by 47%.
In the wake of recent high-profile data breaches in Australia, the global threat landscape is top of mind for everyone from Anthony Albanese to your next-door neighbors. The pressure is...
Pharmaceutical giant Merck's insurers must cover the company's losses involving the 2017 NotPetya malware attack because the "all-risks" property insurance policies' "hostile warlike" exclusions do not apply to the incident, ruled a New Jersey appellate court this week.
Understanding the different types of Microsoft SQL Server backups, you must avoid mistakes and make the best database management decisions for your organization. With new requirements that must be prioritized to keep databases, the crown jewels of your organizations, running in the face of ransomware, natural...
Ireland's child and family agency, Tusla, says it is beginning a months-long process to notify 20,000 individuals that their personal information was exposed in the May 2021 ransomware attack against the Health Service Executive, which formerly managed Tusla's IT systems.
Healthcare entities and their vendors should be prepared to show evidence to regulators of how they've implemented "recognized security practices," or RSPs, says Robert Booker, chief strategy officer of HITRUST. "You've got to demonstrate that you align with a framework."
As the massive ESXiArgs ransomware campaign continues to target unpatched VMware ESXi hypervisors, cybersecurity experts have released a script that can decrypt at least some affected virtual machines. Ransomware trackers count at least 2,803 victims, primarily in France, the U.S. and Germany.
Microsoft suffered its second major outage in less than two weeks, as users in North America and beyond were left unable to send, receive or search emails via Outlook.com and unable to access some additional functionality, including calendar APIs. Microsoft blamed unspecified "recent changes."
The LockBit group has gone from denying it had any involvement in the ransomware attack on Britain's Royal Mail to trying to bargain for a ransom. The ransomware group's site now lists Royal Mail as a victim and demands it pay a ransom or see stolen data get dumped.
Small to medium sized businesses (SMBs) are looking to use technology to enhance their business but need guidance on how to identify the right fit, implement it, and manage it.
Download this whitepaper to learn more about:
Unifying people, processes, and data;
The metrics that matter for growth;
The...
77% of SMBs believe their IT environments have become more complex over the past two years, and 52% of SMBs believe that this complexity is driving a rapid change in the cybersecurity landscape.
Download this eBook to learn about:
A multifaceted approach to building a secure RMM;
Utilizing RMM to secure...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.