Breaches can happen even when there are strong protections in place. But healthcare organizations can do more to prepare for breaches and respond in the best possible way to protect patient information.
Lawmakers are more serious than ever about cybersecurity legislation. Their intent is to enact, but can they compromise on legislation to share cyberthreat information and nationalize data breach notification?
Cybersecurity has been a priority of the Obama presidency from the get-go. But do all of his cybersecurity actions, unprecedented among American presidents, make him a cybersecurity leader?
In addition to 56 million payment cards being compromised in the Home Depot data breach, approximately 53 million e-mail addresses also were stolen, the retailer reported in an investigation update on Nov. 6.
Amsterdam is again playing host to the annual Black Hat Europe information security gathering, and presenters have promised to cover everything from privacy flaws in wearable computers to two-factor authentication system failures.
Healthcare organizations are still struggling to make sense of all the emerging cyberthreats they face and figure out how best to share the latest intelligence and stretch limited security resources. But some are making bold moves.
Google says just 2 percent of the recent dump of nearly 5 million credentials to Russian cybercrime forums contained valid Gmail username and password combinations. But anyone who reused the same passwords on other sites remains at risk from hackers.
Senior leaders are often faced with tough budget decisions. That's why winning support for an investment in an identity and access management tools requires painting a clear picture of the value to the business.
Internet hygiene is not up to par, say cybersecurity experts Tom Kellermann and Rod Rasmussen, who explain why bad hygiene has led to increased botnet traffic and malware infections.
The U.S. Department of Veterans Affairs has launched a new security awareness campaign to help veterans prevent, detect and respond to identity theft. VA CISO Stan Lowe offers details about the program.
An ongoing APT campaign employs decoy documents to lure potential victims into installing malicious remote-control tools. Targets include at least one bank, the BBC and many U.S. and EU government agencies.
It's not quite the cyberwar many have envisioned, but the United States and China are tangled in a brawl that resembles, in some respects, a combination of a trade war and cyber-sniping.
On Christmas Eve, Target issued a warning about phishing scams linked to its breach recovery efforts. In response, the retailer says it is launching a dedicated resource page on its website for official communications.
Many healthcare providers and their business associates have a long way to go with their HIPAA compliance efforts. But two new resources from federal regulators could help pave the way to better security.
Information Security Media Group is offering a growing list of fraud-fighting educational opportunities, including videos of presentations at its recent Fraud Summit plus a series of 2014 summits.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.