Privacy & Security
Hackers are using phishing attacks against employees working from home to gain their user names and passwords, says Christophe Doré, security manager at Capsule Technologies.
This week's top stories include Flo Health landing in hot water with the FTC over data sharing allegations, states moving forward with second doses of the COVID-19 vaccine and health IT heavy hitters creating the Vaccine Credential Initiative.
Pure Storage VP Josh Gluck says not only does Pure bake security into its products, it partners with data protection vendors to ensure its products work hand in hand with those that healthcare organizations are already using.
The complexity of managing security tools across multiple platforms is challenging, so there's an urgency to unify security processes and controls across all environments, says Pritesh Parekh, chief trust and security officer at Virtustream.
This week's top stories include a data breach that prompts healthcare organizations to take preventive steps, the CDC giving $227 million for COVID-19 vaccine preparedness and tracking, and Apple Watch adding a new VO2 Max feature.
Ransomware is the last step before threat actors get paid, so Armor Cloud Security's approach to stopping attacks from succeeding is to "secure left," says Chief Security Officer Chris Stouff.
IoT cybersecurity firm Sternum CEO Natali Tshuva discusses the dangers of unsecured medical devices – and how patient trust can be restored with manufacturer transparency.
This week's top stories include the vaccine distribution pipeline facing serious cybersecurity risks as the rollout begins in the UK, and Google unveiling a new research app that shows participants how their data is driving health insights.
Security can't be just an afterthought when building healthcare products; it has to be a foundation for the way they are built, says Lawrence Huang, VP of product management at Cisco Meraki.
Longtime CIO Drex DeFord, now a strategic healthcare executive for CI Security, says health systems are in the cybercrime crosshairs – and details steps IT and security pros need to take now to shore up their defenses.