A small Missouri clinic admits paying a ransom to unlock data after a ransomware attack in August encrypted patient data on a file server, as well as backups. The incident spotlights the dilemmas healthcare organizations can face after a ransomware attack if they're not well-prepared.
The dark web has become a very effective resource for purchasing sinister educational materials. How-to guides are for sale on major dark web markets such as Hansa and AlphaBay and offer step-by-step instructions for drug trafficking, hacking, social engineering and many other cyber crimes.
Fraud guides, a subset...
Dark web vendors offer a wide range of technological crime. From distributed denial of service (DDoS) attacks to pre-recorded phone calls, there is a myriad of knowledge and listings for hacking & exploits.
In addition to materials for sale, the dark web is also home to a variety of forums designed to build...
Two dozen federal agencies continue to experience security weaknesses in five critical areas, putting government systems and data at risk, according to a new watchdog agency report. But which agency spends the most on IT security?
Freedom of Information requests sent to 430 U.K. local government councils by Barracuda Networks found that at least 27 percent of councils have suffered ransomware outbreaks. Thankfully, almost none have paid ransoms, and good backup practices appear widespread.
In today's shape-shifting threat landscape, every organization needs the same thing: Real-time, actionable threat intelligence. And there is no shortage of intelligence feeds from reputable third-party sources. But are there too many intelligence feeds for systems and analysts to process? How effectively is actionable...
Through an ongoing series of Healthcare Security Readiness workshops, key gaps in how healthcare organizations defend against cybercrime hacking have emerged. Has your organization assessed and mitigated gaps in security...or are even aware of what they are?
In the following ISMG interview transcript, David...
CISOs have plenty to keep them up at night. With data breaches, ransomware incidents and system compromises, security leaders are forced to find ways to beat threats without slowing their pace of business. If they fail to effectively manage those risks, their organizations can face huge consequences.
While process...
In the wake of Hurricane Harvey, Texas hospitals have not yet reported issues involving access to electronic health records and other critical systems, says Lance Lunsford of the Texas Hospital Association.
Today's business climate is one of unprecedented regulatory growth, data complexity and cybersecurity concerns. There is a corresponding increase in media attention, customer awareness and Board-level scrutiny.
Organizations must demonstrate that they have a viable process for managing risk and compliance (broadly...
Ransomware is a rapidly evolving challenge for organizations of all sizes. Despite expert protection technologies and staff, attackers are consistently changing techniques and developing bolder strategies that creep through vulnerabilities. Although the majority of ransomware attacks are spread by email through...
Medical transcription software vendor Nuance is the latest company to acknowledge that it's still struggling to recover from the recent global NotPetya ransomware attacks and will see a dip in its financial performance as a result.
A watchdog agency's annual security review of the Department of Veterans Affairs, the nation's largest healthcare provider, makes 33 recommendations for how the VA can address a variety of continuing vulnerabilities, but only three of them are new. What are the latest concerns?
Many security leaders argue over whether their incident response posture needs to be proactive or reactive. But Rsam CISO Bryan Timmerman says it isn't either or - that organizations need both. Here's why.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.