How do we lessen the risks posed by mobile devices and their apps, along with direct access provided to proprietary corporate data and networks? Here are five clear, actionable ways to mitigate your risks.
IT security provider Mandiant issues a comprehensive report documenting how a Chinese army unit has for years been hacking into the computers of businesses and governments in mostly English-speaking nations, especially the United States.
Even the brightest technologists aren't immune from cyber-attacks. Just ask Facebook. The social-media company says it fell victim to a sophisticated attack in which an exploit allowed malware to be installed on employees' laptops.
Healthcare organizations that allow staff members to use personally owned mobile devices for work-related purposes need to first develop a policy outlining the rules of the road, says federal privacy adviser Kathryn Marchesini.
The White House cybersecurity coordinator, National Security Agency director and top officials from the departments of Commerce, Homeland Security and Justice have scheduled a briefing on the administration's cybersecurity policy the day after President Obama delivers his State of the Union address.
Security threats to healthcare organizations are on the rise - and so are regulatory requirements. Kim Singletary of McAfee discusses the top breach prevention and response challenges for healthcare organizations in 2013.
To comply with the HIPAA Omnibus Rule, business associates and their subcontractors must immediately take several steps, including thoroughly documenting their privacy and security practices, says security expert Susan Lucci.