NSS Labs performed an independent test of the Cisco Advanced Malware Protection v5.2.2015072320. The
product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection
System (BDS) Methodology v2.0 available at www.nsslabs.com. This test was conducted free of charge and NSS...
A security incident involving keystroke logging malware that apparently started at a Kentucky hospital three years ago - but was only recently discovered after a tip from the FBI - offers a reminder of the urgency of keeping anti-malware protection and mitigation efforts current.
While cyberattacks will continue to menace healthcare and other business sectors next year, organizations can't afford to overlook addressing risks tied to insiders, who are responsible for most data breaches, says Michael Bruemmer of Experian Data Breach Resolution.
Earlier this year, we asked: How prepared is your health care organization to respond to an attack, and what resources - in-house and outsourced - are used to defend valuable protected health information?
Healthcare security professionals from around the US were able to help us determine:
The state of breach...
Can your security team detect and identify intruders before data disappears? Are you confident that former employees and contractors no longer have access to your critical systems? These are among the questions we set out to answer in the 2015 Privileged Access
Management Study, sponsored by Hitachi ID Systems, and...
Earlier this year, we asked: How prepared is your health care organization to respond to an attack, and what resources - in-house and outsourced - are used to defend valuable protected health information?
Healthcare security professionals from around the US were able to help us determine:
The state of breach...
Ireland's Cyber Crime Conference in Dublin drew a capacity crowd for a full day of security briefings, networking, hotly contested capture-the-flag and secure-coding challenges, as well as a chance to sharpen one's lock-picking skills.
TalkTalk's confusion in the wake of its recent data breach, as well as mangling of technical details and failure to encrypt customer data, demonstrate the importance of having an incident-response plan ready in advance of any breach, experts say.
The FBI is pursuing a suspected Russian hacker who reportedly amassed a trove of 1.2 billion stolen online credentials, plus payment card data and Social Security numbers, and who's offered access to hacked Facebook and Twitter accounts.
Federal regulators have announced an $850,000 HIPAA settlement with Lahey Hospital and Medical Center stemming from an investigation into the theft of a laptop that was used to operate a medical device.
Politicians arguing in favor of fighting terrorism by creating backdoor access to encrypted communication are overlooking five key factors that make such an approach undesirable and unfeasible.
The Ponemon Institute's findings from our Third Annual Study: Is Your Company Ready for a Big Data Breach sponsored by Experian® Data Breach Resolution, illustrate that many companies still lack confidence in their ability to manage these issues and execute their data breach response plan. We surveyed 604 executives...
The surge in data breaches has left millions of consumer records compromised. As a result, fraudsters have all they need to open bogus accounts, which cost banks huge losses linked to what Greg Shelton of LexisNexis Risk Solutions calls "sleeper fraud."
Insurance fraud schemes are growing in scale and sophistication. But at the same time, insurance companies - and their customers - are losing their appetite to accept fraud losses. IBM's Brian Banigan offers insight on the latest counter-fraud solutions.
LabMD's recent victory in its long legal battle with the Federal Trade Commission will be short-lived, the medical testing lab's CEO predicts. Find out why, and what changes Michael Daugherty hopes the case will bring to FTC's enforcement practices.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.