Privacy & Security
09:08 am February 19, 2018
After all the cybersecurity threats and events in the last 12 months, infosec teams should focus on these priorities as the craft strategies into the future.
11:18 am January 05, 2018
Affected systems include Windows, Linux, Android, Chrome, iOS and MacOS but the good news is there is a public exploit code to test your system for vulnerabilities.
11:38 am December 29, 2017
The healthcare sector is improving its cybersecurity practices but as a whole, much more needs to be done.
10:52 am October 12, 2017
Since before 2013, hospitals and other healthcare facilities knew that falls were a serious problem, and massive resources were marshalled to reduce or prevent patient falls.
12:08 pm December 21, 2015
The scale and intensity of healthcare related cybercrime is a critical and growing threat to the U.S. medical system. If data breaches were a virus, we'd call this a pandemic.
02:07 pm December 09, 2015
2015 has been filled with denial of service attacks, hard-to-detect malware, and a skyrocketing number of personal internet connected devices at the same time that HIPAA enforcement has expanded.
10:40 am December 07, 2015
Windows 10, which Microsoft is positioning as an 'Operating System as a Service' model, offers several innovative new features that will be useful to healthcare users. Here are some things to know for a successful enterprise-wide migration.
03:29 pm November 30, 2015
It's not exactly a secret that there's a worldwide shortage of experienced cyber security professionals. At least one widely-cited report has put the figure at over a million unfulfilled positions.
09:49 am November 16, 2015
While cyber-attackers are becoming ever sophisticated at stealing information from business systems, gaining entry into those systems is relatively easy because employees, vendors and sometimes customers are not very sophisticated at keeping them secure.
10:09 am November 13, 2015
The Ashley Madison hack should raise two immediate questions for organizations everywhere: Do they house sensitive and potentially embarrassing data? If so, is it adequately protected from both internal and external threats?