HackDig : Dig high-quality web security articles for hacker

Securing Medical Devices in the Age of the IoT

The U.S. Food and Drug Administration (FDA) cautioned the health care industry to be wary about networked medical devices containing off-the-shelf (OTS) software that can connect to networks. Both health care IT professionals and manufacturers are responsible for securing medical devices by performing regular software updates and applying security patches. S
Publish At:2017-11-06 09:40 | Read:168 | Comments:0 | Tags:Endpoint Health Care Mobile Security Connected Devices Feder

The CISO’s Guide to Minimizing Health Care Security Risks

In an ever-changing, dynamic threat landscape, a chief information security officer (CISO) in the health care sector must have knowledge in multiple areas and understand that data breaches have severe repercussions that affect employees, patients and the organization at large. To respond effectively to health care security risks, a CISO must possess well-rou
Publish At:2017-10-06 10:25 | Read:171 | Comments:0 | Tags:CISO Health Care Chief Information Security Officer (CISO) H

Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges

Every chief information security officer (CISO) faces ongoing threats to his or her company’s assets. While some threats apply to every industry, IT security specialists in the health care, financial services, and energy and utilities sectors need to pay more attention to industry-specific security risks. Although these threats are most prevalent in th
Publish At:2017-09-26 09:56 | Read:255 | Comments:0 | Tags:Banking & Financial Services CISO Energy & Utility Health Ca

Data Activity Monitoring Gives Health Care Organizations X-Ray Vision Into Medical Imaging Security Risks

In health care, cyberthreats pose a substantial risk to patient safety, systems of care and business continuity. The security of electronic medical information has a tremendous impact on data access, which directly affects quality of care, patients’ rights to privacy and the professional standing of health care organizations. Practitioners can only mak
Publish At:2017-09-25 15:30 | Read:295 | Comments:0 | Tags:Data Protection Health Care Electronic Medical Records (EMRs

Increased Awareness Is the Best Cure for Health Care Security Risks

The health care market is quite heterogeneous, and as a result, each organization has a unique set of cybsersecurity needs and characteristics. The industry includes hospitals of all sizes, local doctoral consortia, public health care institutions and individual physicians. Naturally, health care security risks vary depending on the size and type of organiza
Publish At:2017-09-15 15:35 | Read:392 | Comments:0 | Tags:Data Protection Health Care Risk Management Chief Informatio

Weighing the Benefits and Challenges of Cognitive Adoption

The data mountain is growing at an unimaginable rate, and making sense of it requires a lot of effort and patience. Unorganized information, or dark data, is difficult to interpret, which results in valuable information passing right by marketers unnoticed and unused. Cognitive technology can help make sense of this data, better align it to business goals an
Publish At:2017-08-31 15:15 | Read:324 | Comments:0 | Tags:Cognitive Artificial Intelligence (AI) Cognitive Computing C

The Internet of Things to Come in Cybersecurity

The Internet of Things: Enabling Innovation and Exploitation Stop checking whether or not you’ve achieved your step goal. Right now. The widespread use of bring-your-own-device (BYOD) strategies and the shift towards interoperability within the Internet of Things (IoT) — the interconnection of computing devices embedded in everyday objects such as watc
Publish At:2017-07-11 15:55 | Read:591 | Comments:0 | Tags:Data Protection Health Care Identity & Access Health Care Da

Maintaining CIA to Keep Health Care Security Threats at Bay

Imagine that your health care organization just went on bypass due to a cyberattack. For those unfamiliar with the term, bypass is when a health care facility is unable to provide services for one reason or another. When an emergency room parking bay area is literally full of ambulances, for example, the hospital may go on bypass to ensure that any addition
Publish At:2017-06-29 09:20 | Read:497 | Comments:0 | Tags:Health Care Risk Management Data Protection Health Care Data

Health Care Endpoint Hygiene: A Post-WannaCry Call to Action

More so than in any other industry, the recent WannaCry attack caused health care organizations to rethink processes for keeping systems current and secure. Although Microsoft patched the very vulnerabilities WannaCry exploited over three months ago, many organizations are still struggling to find and patch relevant computers and systems. The Hidden Complexi
Publish At:2017-06-22 11:35 | Read:367 | Comments:0 | Tags:Endpoint Health Care Advanced Malware Endpoint Management En

Technology Treatment Plan: The Health Care Cybersecurity Imperative

Health care is under siege from cybersecurity threats. As noted by Healthcare IT News, another large-scale health insurance vendor recently shuttered its patient portal to deal with vulnerabilities that exposed personal data. Meanwhile, Beta News reported that 43 percent of all data breaches in the U.K. come from the health care sector. Now, the U.S. Departm
Publish At:2017-06-14 19:25 | Read:973 | Comments:0 | Tags:Data Protection Health Care Cybersecurity Legislation Federa

The Looming Threat of Health Care IoT Devices

A computer generation or two ago, IT managers fought a futile uphill battle to prevent rogue PCs from infiltrating the workplace, a battle fought largely in the name of data security. Their thinking was that if IT couldn’t manage it, they couldn’t secure it. Is history repeating itself with health care IoT devices? Fast forward to the present h
Publish At:2017-05-15 14:00 | Read:1065 | Comments:0 | Tags:Endpoint Health Care Network Connected Devices Health Care D

Compliance Does Not Always Cure Health Care Security Woes

For organizations in highly regulated sectors such as health care, compliance with regulatory standards is not just a good idea; it’s the law. Moreover, there is a broad consensus that the regulatory standards are soundly based on security principles. Complaints about excessive or misguided regulations are not often heard. But the flip side of this r
Publish At:2017-05-14 01:10 | Read:514 | Comments:0 | Tags:Data Protection Health Care Compliance Data Privacy Endpoint

The Doctor Is In: Building a Security Immune System for Health Care

If you’re a member of my generation living in the U.S., you may remember the Bubble Boy. His story grabbed the national consciousness and was made into a TV movie featuring John Travolta. It was a sad tale of how a boy with a severe immune deficiency was forced to live his life inside a plastic bubble to protect him from pathogens. A single breach of t
Publish At:2017-05-14 01:10 | Read:783 | Comments:0 | Tags:Data Protection Health Care Health Care Industry Health Care

Building a Holistic Cyberhealth Immune System

With the increased focus on the importance of cybersecurity in the health care industry, it is important to think of a more holistic approach to address the industry’s pain points when managing the massive amounts of data are generated at an incredible pace every day. This growing challenge calls for an immune system approach to security. According to
Publish At:2017-05-05 20:20 | Read:849 | Comments:0 | Tags:Data Protection Health Care Data Security Electronic Health

The Conundrum of Health Care Security Spending

Health care security spending is one of those riddles wrapped in a mystery inside an enigma. Assets such as electronic medical records (EMR), which are ostensibly protected by security solutions, are probably cybercriminals’ most prized purloined item. On the Dark Web, a stolen EMR laden with its immutable data can fetch as much as $350 per individual
Publish At:2017-05-02 19:00 | Read:673 | Comments:0 | Tags:Data Protection Health Care Data Security Health Care Data H

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud