Data Warehousing

(Photo: Jjpwiki/Wikpedia)

By Bill Siwicki 02:19 pm October 04, 2016
The vendor also has announced the availability of Dell EMC InfoArchive 4.1 and Dell EMC Clinical Archiving 2.0 software.
By Jessica Davis 01:59 pm October 04, 2016
Oxford, Mississippi-based Urgent Care Clinic of Oxford reported it was a victim of a ransomware attack, which appears to have been initiated by Russian hackers.

"Parasitic infectors naturally cause a lot of unintentional corruption of infected files, as malware writers aren't generally known for their excellent quality assurance testing skills," said ESET's Lysa Myers.

By Jessica Davis 11:23 am September 30, 2016
While the ransomware has been active for two years, Netskope researchers say its new strain leverages users syncing and sharing data to spread infected files through the network.
By Jessica Davis 11:35 am September 27, 2016
It also neglects to cover all the elements from the NIST Cybersecurity Framework, according to the new report, which offers five suggestions for protecting electronic health information.
By Jessica Davis 01:58 pm September 26, 2016
First spotted in January, security firm Trend Micro has seen an increase this month in the ransomware’s distribution campaign.

"More and more malware is being put into our ecosystem that traditional security techniques are powerless to prevent," said Check Point President Amnon Bar-Lev.

By Jessica Davis 02:23 pm September 23, 2016
Unknown malware attacks have increased nine-fold from 2015, driven primarily by employees who accidentally install malicious software onto their company's network – at a rate of every four seconds, according to a recent Check Point report.
IBM cyber threats
By Jessica Davis 02:51 pm September 21, 2016
The number one threat to healthcare data isn't the most obvious. Rather than malevolent, faceless hackers, it's often an organization's own employees who open the door to theft, malware, ransomware and a host of other problems, according to IBM's 2016 Cyber Security Intelligence Index.

John Riggi, head of the Cybersecurity and Financial Crimes Unit for BDO Consulting and former chief of the FBI's Cyber Division Outreach Section.

By Jessica Davis 01:11 pm September 16, 2016
John Riggi and Judy Selby of BDO Consulting share three steps to effective data mapping: third party assessment, an infinite response plan and a strong employee training program.
By Jessica Davis 10:49 am August 30, 2016
A recent Cybersecurity Ventures report, sponsored by security firm Herjavec Group, also found global cybersecurity defense costs will exceed $1 trillion over the next five years.
By Jessica Davis 11:09 am August 29, 2016
Long Beach, California-based SCAN Health Plan reported its contact sheets' system had been breached by an unauthorized party, which exposed the data from its 107,000 members and some non-plan members who provided their personal information to its sales team.

Most Read

The Daily Brief Newsletter