Hackers can strike any industry, but there has been an alarming increase in targeted and successful cyberattacks in healthcare. Now, more than ever, it's essential that your healthcare organization is prepared and has strategies in place for managing data breaches. Here are seven strategies to use.
Airbus has once again expressed interest in Atos' $4.8 billion cybersecurity, big data and digital business - this time as a minority stakeholder, Les Echos reports. The Dutch aircraft manufacturer has started exploratory talks to take a noncontrolling interest in Atos' Evidian business.
Arizona has long been a leader in leveraging IT and providing digital services, but across the state and country alike, new challenges are emerging in the wake of the pandemic, and with them come new threats and risk factors, including remote work security, says Ryan Murray, deputy state CISO.
Rackspace says the ransomware-wielding attackers who disrupted its hosted Microsoft Exchange Server environment last month wielded a zero-day exploit, described by CrowdStrike as being "a previously undisclosed exploit method for Exchange," to gain remote, direct access to servers it hosted.
Many enterprises over the past three years jumped from "dipping their toes" into the cloud to being immersed in multi-cloud environments. How has data management changed as companies distribute data across cloud, data centers and on-premises? John Drake and Brian Hoekelman of Faction share insights.
After two sensational years in the public markets during the height of COVID-19, 2022 was a rude awakening for the cybersecurity industry. The four-headed monster of inflation, interest rate hikes, supply chain shortages and the ongoing Russia-Ukraine war dragged most stock prices down.
Researchers uncovered thousands of Citrix servers that are vulnerable to two critical flaws, one of which is being actively exploited by nation-state hackers. Netgear also warned its customers about a denial-of-service vulnerability affecting some of its devices.
In the latest update, four ISMG editors discuss important issues of 2022, including: CISO Marene Allison's unique career path; Ukrainian government cybersecurity official Victor Zhora on lessons learned from countering cyberattacks; and insights from CEO Nikesh Arora of Palo Alto Networks.
Hospitals must not only prepare in advance for ransomware and other debilitating attacks on their organizations, but also for responding to the effect of cyber incidents at neighboring facilities, says Dr. Christian Dameff of the University of California San Diego.
In this episode of "Cybersecurity Unplugged, Stan Golubchik, founder and CEO of ContraForce, discusses the company's mission, beginnings and plans for expansion. Golubchik says ContraForce answers the "need for a stronger generalist workforce for cybersecurity."
A North Korean state-sponsored APT group targeted nearly 900 foreign policy experts from South Korea to steal their personal data and carry out ransomware attacks. Targeted individuals mainly had backgrounds in diplomacy, defense and security and were working toward Korean unification.
A critical Linux kernel vulnerability exposed the server message block protocol to remote hacking with highest privileges. The vulnerability received the maximum possible severity rating of 10 on the CVSS scale owing to the kernel-level code execution privileges it gave to the attacker.
Stop the presses: Britain's Guardian Media Group has been hit by a "serious IT incident," believed to be ransomware, that appears to have encrypted numerous systems. Experts say ransomware groups love to strike over the holidays, adding pressure on victims to pay a ransom quickly and quietly.
In this episode of "Cybersecurity Unplugged," Joe Weiss, managing partner at Applied Control Systems, offers suggestions for how to harden our OT networks today, including what CISOs need to know and how guidance from the federal government needs to change.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.