The FBI, Gartner, and many other security analysts cite social media as one of the fastest growing security threats. That is why it is important for security teams at organizations with a significant social media presence to gain an understanding of this new attack surface and develop a plan to protect the...
Little has been done to address the social media hacking problem despite continued headlines. Most organizations lack the protective countermeasures or the expertise to mitigate risk and respond to incidents. Few companies know how to re-gain control after an account compromise or how to prevent an attack in the first...
Social media account takeovers have become synonymous with embarrassing headlines that feature well-known companies and figures. If your organization has a prominent account, cyber attackers will see you as a ripe target.
Download this whitepaper and learn:
How these takeovers are possible;
Why the complexity of...
Ransomware presents some unique challenges to organizations, regardless of their size, industry or geography. It has very distinct behavior relative to other kinds of malware. For example, it actually tells you that an attack has taken place. From a defender's point of view, being alerted to an attack is far better...
Healthcare organizations can learn important lessons - including the need for granular data access control - from the costly proposed settlement of the breach lawsuit against health insurer Anthem, says Bill Fox, a former federal prosecutor.
It can be incredibly disruptive and time-consuming to add new security technologies to your network. However, it is vital to continue to advance your organization's ability to detect and respond to advanced malware - especially malware that evades other "advanced" security tools like sandboxes and...
A Dallas physician has been sentenced to 35 years in federal prison and ordered to pay more than $268 million in restitution for his role in a huge Medicare and Medicaid fraud conspiracy involving billing for unnecessary home healthcare services.
Kaspersky Lab says it will withdraw antitrust complaints it filed against Microsoft over how Windows handles third-party security products, defusing a yearlong dispute. Microsoft says it will work closer with security companies to ensure compatibility with Windows.
For many organizations, fighting the growing threat of ransomware doesn't necessarily have to mean investing in new technologies, says Robert Arandjelovis of Symantec.
Security vendors are known to sprinkle hyperbole among their claims. But the strategy has backfired for DirectDefense, which mistakenly cast endpoint protection vendor Carbon Black as a contributor to the "world's largest pay-for-play data exfiltration botnet."
How the critical capability of machine learning can help prevent today's most sophisticated attacks
While many organizations are guarding the front door with yesterday's signature-based antivirus (AV) solutions, today's unknown malware walks out the back door with all their data. What's the answer?
Enter:...
Just in time for the seasonal upgrading of tax software, the IRS is warning of phishing emails purporting to be software updates, but which try to trick tax professionals into divulging login credentials.
This monthly Security Agenda will highlight some of the most recent additions to our course library. July's edition features Greg Wilshusen on how the Government Accountability Office conducts audits. Other influencers like Robert Villanueva founder of the Cyber Threat Intelligence Division of the U.S. Secret Service,...
The Department of Homeland Security has issued an alert warning about cyber vulnerabilities in certain Siemens medical imaging products running Windows 7 that could allow hackers to "remotely execute arbitrary code." How serious are the risks?
The latest edition of the ISMG Security Report leads with a report on the charges brought against Marcus Hutchins, the "accidental hero" who stoped the WannaCry malware outbreak. Also featured: reports on advances in attribution and new legislation to secure vulnerable medical devices.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.