Ransomware has exploded to become the highest-profile cybercrime of 2016. Once aimed primarily at consumer PC users, ransomware now has become the bane of enterprises of all sizes and sectors. Criminals infect systems with polymorphous malware that either locks or encrypts critical data or devices until a ransom is...
From the Anthem breach to the compromise of the U.S. Department of Personnel Management, spear phishing has been at the heart of many high-profile security incidents - including the most recent attacks at Seagate and Snapchat. How prevalent are spear phishing attacks, what business toll are they taking on...
With the rise of ever-sophisticated botnets, ransomware and spyware, we know that cybercriminals are targeting your organization with increasingly powerful malware. How strong - and updated - are your malware defenses?
From traditional account takeover and fraudulent benefits schemes to the latest nuances of business email compromise, financial and government organizations continue to be victimized by persistent fraudsters. Take the 2016 Faces of Fraud Survey to learn more about the Analytics Approach to Fraud Prevention.
Actionable threat intelligence - it's the key to effective cyber threat detection and response. But how good is the threat intelligence organizations receive today? And how well are they able to put this intelligence to work to improve their cybersecurity?
Enterprise security is a moving target - and so is your organization. How do you know if you're making the right investments? Participate in this survey and find out.
Whether seeking to block external attacks or curb internal abuse, security-conscious organizations increasingly are focusing their efforts on protecting the true crown jewels: privileged identities.
By most industry accounts, distributed-denial-of-service attacks are bigger than ever - and even easier for attackers to launch. What is your institution's likelihood of being targeted for DDoS, and what is your ability to detect and mitigate such attacks before they result in significant business disruption for your...
From Anthem to OPM, the news continually alerts us to high-profile breaches that involve the compromise of critical data. And as breach incidents and costs mount, security leaders must ask: How secure are our data centers? How secure should they be?
Cyber threats are evolving and the landscape of fraud is changing - but so is cyber security. How is Breach Response changing? What have we learned since our 2014 Faces of Fraud survey and is it being applied?
Healthcare data breaches are ever-present in the headlines over the past year. Does your data breach prevention plan look like theirs? How will your healthcare organization respond to a breach? Take our survey to help us assess breach readiness in Healthcare in 2015.
The Healthcare Information Security Today survey is a comprehensive study that measures progress toward ensuring the privacy and security of healthcare information as more records are digitized and shared, and as new cyberthreats emerge and evolve.
It's been four years now since the Federal Financial Institutions Examination Council issued its updated authentication guidance, focused primarily on helping banking institutions defend against account takeover schemes. Have institutions deployed the FFIEC's recommended security controls, and are they doing a better...
In 2015, it's time to revisit information security leaders and gauge not just the deep impact of these breaches, but the state of global organizations to prepare for and respond to such devastating attacks. How well fortified are organizations to prepare for and respond to the inevitable? Are their security programs...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.