If malware infections and data breaches are inevitable, then why should organizations even try to be proactive? Isn't a reactive stance more appropriate? Not so, says Marcin Kleczynski, CEO of Malwarebytes.
When it comes to healthcare payments, fraud tends to come in two flavors: Organized and opportunistic. What are the biggest gaps in detecting and preventing these schemes? IBM's Robert McGinley shares insight.
The bad news is that the new KeyRaider malware has so far compromised more than 225,000 Apple accounts worldwide. The good news, according to Ryan Olson of Palo Alto Networks, is that only modified, or "jailbroken," ioS devices are at risk.
Cybersecurity risks to medical devices will become an even more critical issue for healthcare organizations to address next year because of the need to maintain patient trust, says Rob Potter of Symantec.
Underground cybercrime forums continue to evolve, offering services ranging from cybercrime toolkits and money laundering to bulletproof hosting and a service that reviews exfiltrated data for corporate secrets, says cybersecurity analyst Tom Kellermann of Trend Micro.
In preparing business associate agreements, healthcare organizations should demand a right-to-audit clause and copies of vendors' current security policies as proof that the companies are taking appropriate measures to protect patient data, says security expert Rebecca Herold.
CISOs who want to keep more cyber-attacks from succeeding should focus on decreasing the half-life of vulnerabilities, which refers to the amount of time it takes half of all systems affected by a vulnerability to get patched. That's the advice from Qualys' Wolfgang Kandek.
One of the most difficult challenges in protecting sensitive patient data that's used in medical research is educating researchers and other clinicians who share that data about potential privacy issues, says Dave Summitt of Moffitt Cancer Center in Florida.
Rand Corp.'s Martin Libicki sees circumstances in which a weaker economy could curtail Chinese cyber spying on U.S. companies. Then again, he says, the Chinese government could see spending money on hacking as an economic stimulus.
Hacker attacks often start with spear-phishing attempts, but healthcare entities can take steps to help prevent these scams from being successful, says Connie Barrera, CISO of Jackson Health System in Miami, who describes her organization's approach.
To help mitigate the risk that blackmail and extortion campaigns might target employees, employers' security teams must regularly review post-breach data dumps as well ramp up enforcement of their corporate security policies, says Stephen Coty of Alert Logic.
Despite the ongoing ban on federal funding for the development of a national unique patient identifier, progress is being made through collaborative efforts to improve patient data matching to ensure safety and privacy, says security expert Lisa Gallagher.
An inspector general's memo that highlights three significant information security deficiencies that have plagued the U.S. Department of Labor for the past five years points out problems that most federal agencies confront.
The recent FDA alert advising healthcare organizations to stop using a line of infusion pumps because of cybersecurity flaws, coupled with earlier guidance from the agency, will lead manufacturers to be more focused on risk management, predicts attorney Anna Spencer.