Hacking incidents still dominate the major health data breaches being reported to the U.S. Department of Health and Human Services in the first months of 2022 by far, with only one other type of breach appearing on the federal tally so far this year. Are organizations missing other breaches?
Employees with too much access can pose an insider threat. When employees have access to more than they need to do their job, there are more opportunities for mistakes, whether accidental or not. Lack of accountability means you
don’t know who did what, when. If too many people have the same level of access and...
All organizations with third-party environments are at risk of supply chain attacks, especially as digital environments become more complex. The risks of supply chain attacks on IT environments extend beyond data loss, especially when operational technologies are targeted. An effective defense requires technology that...
A consolidated legal case that includes allegations of embezzlement, trade secret theft and intimidation offers an inside look at a complicated and messy alleged insider breach reported last year by a Texas-based accountable care organization.
Things are not always what they seem, says incident response expert Joseph Carson, pointing to a case involving ransomware that infected a company in Ukraine, but for which there was no external attack path. Ultimately, his investigation found that ransomware had been used to hide internal fraud.
The Annual Data Exposure Report 2022 shines a spotlight on the risk of cloud technologies and the need for better Insider Risk education. The Great Resignation and the hybrid-remote workforce is creating urgent data exposure challenges. Findings from the report reveal that cybersecurity teams are facing unprecedented...
Insider Risk Management for Dummies is your guide to a new way of looking at data risk from within your organization. This book examines all sides of today’s and tomorrow’s Insider Risk issues and offers up-to-date ideas for resolving them.
The guide includes:
A detailed journey through the world...
Aberdeen’s Risk Report sets out to answer the question, “How can you know what to do about Insider Risk if you don’t first know how much Insider Risk your organization has?” The report goes on to explain that the best way to understand insider risk at your organization is through visibility, context, and the...
Despite what is reported in the news, many cyber incidents and cyberattacks are perpetrated by insiders, including employees, former employees, and contractors. Insider threats are particularly hard to guard against, especially when someone has legitimate access to your data. An insider threat program can help make...
Understanding and detecting insider threats, both malicious and negligent, is critical to securing your organization's data and IP. This white paper from Exterro provides useful best practices gleaned from organizations that have developed insider threat mitigation and prevention programs, giving you a head start on...
The CISO for a Dallas-based school district quit his job over the district's handling of a severe data breach that occurred in August 2021. A TV broadcaster has revealed that two students in the district were responsible even though the district claimed the intruder was a "third party."
Pharmaceutical giant Pfizer alleges in a federal lawsuit that two former executives stole documents containing trade secrets about diabetes, obesity and cancer treatments under development by the drugmaker to benefit two new biotech startups they had launched.
Of the $5.6 billion obtained by the Department of Justice in civil settlements and judgements involving false claims and fraud against the U.S. government in 2021, more than $5 billion - or nearly 90% - involved healthcare sector entities. Why? Healthcare fraud, including false claims.
In the midst of accelerated modernization, increased cybersecurity risks, and the new normal of hybrid work and learning environments, technology leaders in higher education have had to meet enormous challenges. As we enter the new year, what’s on their minds when it comes to issues of cybersecurity, hybrid...
No matter the root cause, the result is the same: reputation damage, fines, compliance issues, and of course the ripple effects that extend outward from a breach.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.