The massive cyber-attacks targeting health insurers Premera Blue Cross and Anthem Inc. make it clear that hackers increasingly view large healthcare organizations, especially payers, as attractive targets.
When Todd Davis helped found LifeLock in 2005, ID fraud was a niche consumer issue. Today it's a major enterprise risk. What are today's top fraud threats, and where are some of the surprising security gaps?
All too often, an enterprise invests in security technology and services thinking that they'll be protected from a cyber attack only to discover that they are breached anyway. It prompts some sober reflection and a reassessment of their whole approach to security.
Businesses undertake a security program assessment...
On the heels of the FFIEC's new business continuity guidelines, Deputy Comptroller Beth Dugan hints that new guidance related to cybersecurity risks affecting payments and mobile transactions may be coming.
The massive cyber-attack against health insurer Anthem makes it crystal clear that the healthcare sector has become a new favorite target for hackers. So what needs to be done to defend against hacks?
When you're a hacker, time is on your side. Time to find a soft spot in your armor, to evade defenses, to seek out your most critical data. Increasingly, today's advanced threats circumvent traditional defenses - even sandboxing. You need a new approach. This SlashGuide white paper helps you understand advanced...
A new survey from IDG Research Services tells the story: most organizations lack confidence in the ability of their security defenses to keep them safe. In fact, more than half said 100% security is a pipe dream. This summary by Network World lays out the facts but also presents an approach to detect malware and...
Application security, especially for medical devices, needs to be a higher priority because vulnerable apps can create patient safety issues, expose patient information and raise the risk for ID theft and fraud, says security specialist Mike Weber.
Some experts are concerned that the Department of Health and Human Services' Office for Civil Rights isn't taking bold enough action in stepping up its efforts to enforce HIPAA. Learn more about their areas of concern.
Attackers are bypassing conventional security deployments almost at will, breaching systems in a wide swath of industries and geographies. That's the stark conclusion of new data gathered by more than 1,600 FireEye network and email sensors deployed in real-world networks. Following up on our May 2014 report,...
The numbers are staggering. Security alerts come in by the thousands every month, and you and your IT team are tasked with handling each one. Even when alerts are caught and categorized correctly, the sheer volume is overwhelming. And when they're not responded to quickly, the consequences can be disastrous.
In...
As the technology landscape evolves and attackers continue to adapt, we're going to see new vulnerabilities to mobile, new operating systems and the cloud - and new ways for attackers to exploit these weaknesses.
Download this whitepaper to learn:
Technical predictions for the upcoming year;
Business...
The HHS Office for Civil Rights still has plenty of work to do before it can launch its long-promised next round of HIPAA compliance audits, says Director Jocelyn Samuels.
The rapid rise in cyber-attacks on healthcare organizations necessitates the use of a cyber-centric risk management framework. Recent incidents, including the hacking attack on Community Health Systems, show healthcare is an easy target.
Ninety percent of even the largest global firms are susceptible to targeted attacks. And if adversaries want to get in, they can, says Peter George, CEO of Fidelis Security Systems, who discusses new security strategies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.