In recent months the Dell SecureWorks Counter Threat Unit has found that the healthcare industry is particularly vulnerable to advanced threats, with many of the most prevalent malware tools used by Advanced Persistent Threat (APT) groups affecting the healthcare industry at a rate comparable to or greater than its...
Mobile device usage in healthcare facilities has increased significantly in recent years, with more than 2 out of 5 physicians already using a smartphone or tablet during patient consultations. The potential benefits to adoption of these devices are compelling, including facilitation of patient involvement in the care...
A full 60% of organizations haven't done the basics.
Read this ESG Brief, Advanced Malware Protection Must Extend to Incident Detection and Response, and discover:
How your organization's incident response steps stack up
Why 'stop the bleeding' approaches are inadequate
A 5-step process to enhance your...
Organizations are at a crossroads when deciding on the proper course of action to take in becoming compliant with regulations applicable to the healthcare industry. This decision can shape the foundation of an organization's security culture and prepare the company to meet a vast array of regulatory requirements. What...
This report outlines Forrester's future look for mobile security and operations. Mobility holds the promise of fostering new innovations, reaching new audiences, and creating never-before-seen user experiences and opportunities. IT must embrace a "stateless" architecture where security controls are decoupled from the...
According to Forrester Research, bring-your-own-technology (BYOT) will remain a thorny issue for CIOs in every industry, geographic region, and company size over the next five years. They have recently published their 2012 report examining how and why bring-your-own-technology (BYOT) will vary across 20...
The 2013 Mobile Security Strategies survey is now closed for participation. Results will be available in the coming weeks, providing practical insights on emerging security trends and investments.
Stay tuned for analysis of how organizations will address the top mobile security challenges of 2013, with emphasis...
If your employees are spending personal time online during work hours at a typical rate, you could actually be paying the equivalent of six employees' salaries a year for nothing. And that's just the tip of the iceberg when it comes to how employees can take their own companies down financially. Fraud, harassment and...
You think your environment is secure, but it isn't. Employees are stealing data, committing fraud, and leaking information - all putting your business at risk. How do they do it? Can you stop it? Discover more in this white paper.
So, you've got your environment set up to fend off most external attacks. That's...
Hospitals often require that the enterprise security teams walk a fine line to safeguard patients' health information without impeding the ability of our staff and physicians to deliver the best patient care. Large healthcare organizations are always challenged with increasing productivity while reducing costs....
APTs are not welcome here. Leading hotel chain Motel 6 is fighting back against advanced persistent threats to protect credit card numbers and other private customer data. Trend Micro Deep Discovery gives Motel 6 a custom APT defense with visibility and control across data centers serving 5,000 endpoints. Security...
Trying to embrace BYOD while ensuring your employees can access all of the business apps and content they NEED on the mobile devices they WANT - without compromising security, integrity or compliance? This whitepaper explores the impact of consumerization and BYOD on modern IT departments, and the evolving...
Like most enterprises, you're deployed encryption broadly to protect information and authenticate systems. Yet what impact does poor encryption management have on your business? According to Aberdeen, poor key management practices are costing organizations millions in security and compliance-related incidents, and...
A recent Aberdeen Group Market Alert offers in-depth analysis about how attackers are targeting and successfully exploiting known vulnerabilities in the certificate infrastructure, and why most enterprises are not managing the associated risks.
Download the Market Report to learn:
Why certificates are the...
Employees are using a range of new web-based applications to get their jobs done and you've got limited visibility, let alone control. But one thing is certain - many of these applications are evasive and firewall aware and hackers are using them to penetrate networks.
How do you encourage productivity and minimize...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.