Almost 6 million Americans had their patient records stolen or exposed in healthcare breaches over the past year with ransomware being a frequent and highly effective form of attack. Recent successful variants such as SamSam and Ryuk have caused an estimated $7 million in damages alone.
Clearly, ransomware is a...
Healthcare organizations are attractive targets for today's hackers due to reams of personal information providers process and store. These electronic health records are like digital gold to adversaries who sell them on the black market.
Download the ThreatQ for Healthcare Industry Brief to learn:
The key challenges...
Finding out your healthcare organization has been breached can be devastating news. Knowing how to deal with an intruder who has broken through your cyber defenses can be even more challenging.
This whitepaper offers practical steps healthcare IT and security professionals should take after a cyberattack occurs....
The year's CrowdStrike® Global Threat Report offers one of the industry's most comprehensive reports on today's most damaging cyberattacks and dangerous adversaries. It contains valuable insights into the evolving threat landscape and includes recommendations that will help you be better prepared for the security...
As information security threats intensify, organizations' risk management tasks are becoming disoriented - focused more on grappling with complex technology, an explosion of data, increased regulation and a debilitating skills shortage. This is a huge danger, because prompt action is required to interpret an...
The healthcare industry is at an information security crossroads, ill-prepared for the cyberattacks increasingly targeting healthcare organizations. This session will review how the focus on security regulatory compliance has hindered the healthcare industry's ability to prevent, detect and respond to the current...
We are experiencing the Fourth Industrial Revolution, which is characterized by a range of new technologies that are fusing the physical, digital and biological worlds, impacting all industries. Healthcare is the lead industrial area in this revolution, and one of the major catalysts for change is the rapid digital...
There has been a proliferation of ransomware attacks against healthcare organizations that has ushered in a new wave of extortionware and a new generation of malware attacks. While these types of attacks are not new, they have become more insidious, sophisticated and are growing in popularity.
In order to defend...
The healthcare sector is a prime target for hackers due to the value of medical records offered for sale on the dark web and the industry's struggles to develop and carry out effective data security strategies. In addition, many organizations rely on the services of third parties that may also lack adequate security...
Intellectual property and protected health information are both extremely valuable to cybercriminals, which is why hackers are increasingly targeting healthcare organizations. Increasingly, patients, providers, pharmaceutical companies and others are relying heavily on mobile devices to exchange sensitive information,...
Medical devices and their supporting ecosystem account for the vast majority of connected equipment inside the provider network, yet their risk is often not properly assessed. Without proper understanding of the threats to, vulnerabilities within and parts of a medical device ecosystem, it's almost impossible to...
Ransomware attacks have become commonplace in the healthcare sector, so it's only a matter of time before your organization is targeted. The ransomware epidemic is yet another reminder that all organizations need to manage security across the enterprise and be able to detect new vulnerabilities and respond quickly to...
It takes vigilance, resources and effort to ensure that protected health information is secured on all devices where it resides. Organizations must create a complete inventory of all devices containing PHI, and then implement all necessary steps to ensure it stays secure, no matter where it's stored. In this session,...
Protecting end-user devices is an essential part of any information security strategy. But many healthcare organizations have literally thousands of medical devices - from infusion pumps to heart monitors - used in patient treatment that can be vulnerable, opening the door to a broader cyberattack. In this session,...
In the current threat environment, healthcare organizations need to gear up their defenses to tackle an array of cyber threats, from ransomware campaigns to nation-state attacks to hackers looking to steal patient information and sell it for a profit. The defensive effort requires a "wartime" mindset throughout the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.