Tales of poorly secured internet-connected cameras come along regularly. But the latest installment seems especially egregious because it involves Verkada, a widely used "surveillance camera as a service" startup, and led to remote hackers being able to spy on customers via their own cameras.
Billions of documents are exiting the enterprise’s perimeter through unsecured databases – exposing confidential and sensitive data. How many of these data leaks belong to your organization?
David Sygula, CybelAngel Senior Cybersecurity Analyst and Author shares 2020 research, which exposes the source and...
Police say they have disrupted Sky ECC - a global encrypted communications network allegedly used by numerous criminals to plan their operations - and made numerous arrests. Authorities say starting in February, they "unlocked" 3 million messages exchanged daily by the service's 170,000 users.
The "Arson Cats" research group says it was able to exploit flaws in internet-accessible security cameras built by Silicon Valley "cloud-based enterprise video security" startup Verkada to access live video and audio feeds from inside Tesla, Okta and Cloudflare offices, plus healthcare facilities and prisons.
Nearly four years after the WannaCry ransomware hit the world, targeting the EternalBlue vulnerability in Microsoft SMB version 1, security firms say the malware continues to be a top threat detected in the wild by endpoint security products. Why won't WannaCry just die?
It used to be enough to protect the network perimeter, but in recent years, an expanding perimeter has opened the door to threat actors preying on a larger attack surface.
Understanding the evolution of endpoint security and the solutions available to your organization is key to protecting your business in...
The healthcare industry is going through a huge digital transformation with the Internet of Things (IoT). New connected devices bring the promise of improved patient care, improved efficiency, and reduced costs - offering a new digital relationship between the patient and the caregiver. But many of these new connected...
Healthcare providers are deploying more connected medical devices everyday and they can make up as much as 74% of the devices connected to a hospital’s network.
So how do healthcare providers deploy these new technologies in a way that also protects patients and their sensitive health information? This report...
Read how security managers in healthcare delivery organizations (HDOs) are dealing with new cyber risks associated with connected medical devices such as MRI machines, infusion pumps, etc.
According to the “State Of Enterprise IoT Security In North America: Unmanaged And Unsecured” study that was commissioned...
As connected medical devices multiply, they open up lethal vulnerabilities that put patient’s lives at risk. Learn about real-world medical device risks and mitigation best practices.
Findings from the report include:
What are the real risks posed by connected medical devices, and what is hype?
...
The cybersecurity firm McAfee Corp. announced Monday it will sell its enterprise business unit to the private equity firm Symphony Technology Group for $4 billion cash and then focus solely on its consumer business. STG also owns RSA.
Supermicro and Pulse Secure have each issued advisories warning users that some of their products are vulnerable to an updated version of Trickbot malware that features a bootkit module, nicknamed Trickboot, which can search for UEFI/BIOS firmware vulnerabilities.
Digital transformation is a way of life in today’s business world. It touches all corners of the enterprise in ways that were once unimaginable. CIO and IT executives at companies of all sizes and in all industries are quickly coming to realize that most legacy tools and processes are, at best, inefficient and are...
Modern IT teams feel pressure from all directions. They must maintain compliance with data privacy regulations, track and secure sensitive data across endpoints and manage an ever-increasing number of assets, all while enabling business growth. Balancing these priorities often causes significant challenges for many...
Traditional perimeter-based IT security models aren’t well suited for today’s world of cloud services and mobile users. Savvy attackers can breach enterprise networks and fly under the radar for weeks or even months.
Threat actors always find new and innovative ways to penetrate networks, steal data, and disrupt...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.