Cybersecurity risks in healthcare are an ongoing crisis

While healthcare providers have been implementing technical, administrative and physical safeguards related to patient information, they have not been as diligent in securing their medical devices. These devices are critical to patient care and can leave hospitals at risk for cyberattacks, causing major disruptions to patient care. In fact, 88 million individuals have been affected […]

The post Cybersecurity risks in healthcare are an ongoing crisis appeared first on Security Intelligence.

Continue reading Cybersecurity risks in healthcare are an ongoing crisis

Remote Employees: Update Your Routers (and More WFH IT Tips)

As a business owner or manager, you must ensure your employees have the right tools and resources to do their jobs well — especially with more people working from home. And IT infrastructure is one of the most important considerations regarding remote work. However, the truth is that most employees don’t think about their IT […]

The post Remote Employees: Update Your Routers (and More WFH IT Tips) appeared first on Security Intelligence.

Continue reading Remote Employees: Update Your Routers (and More WFH IT Tips)

Demystifying SSD Security

You left your laptop in a taxi or it was confiscated at a customs checkpoint. How do you ensure your personal or corporate data is safe? There are a number of best practices to follow. SSD Best Practices Step 1: Shut down your device in public spaces … Continue reading Demystifying SSD Security

Critical, Unpatched Bugs Open GE Radiological Devices to Remote Code Execution

A CISA alert is flagging a critical default credentials issue that affects 100+ types of devices found in hospitals, from MRI machines to surgical imaging. Continue reading Critical, Unpatched Bugs Open GE Radiological Devices to Remote Code Execution

Cybersecurity Baseline for IoT Device Manufacturers

The pervasive impact of Internet of Things (IoT) devices on our lives is greater than that of traditional IT devices. There are several unknowns in IoT security, and it raises concerns for customers who are looking to incorporate IoT devices in their e… Continue reading Cybersecurity Baseline for IoT Device Manufacturers

Device Security: Don’t Count on Users

When it comes to device security, companies need to be more proactive in baking in security to their software development life cycle COVID-19 forced businesses to think about cybersecurity in new ways, which was to be expected, as organizations had to… Continue reading Device Security: Don’t Count on Users

UEM: Improving Device Security for Remote Workers

UEM is finding its place in corporate security in the face of the work-from-home directive brought on by COVID-19 Amid the COVID-19 pandemic, teams all over the globe have had to adjust to working remotely. Naturally, the transition can be rocky for t… Continue reading UEM: Improving Device Security for Remote Workers

UEM: Improving Device Security for Remote Workers

UEM is finding its place in corporate security in the face of the work-from-home directive brought on by COVID-19 Amid the COVID-19 pandemic, teams all over the globe have had to adjust to working remotely. Naturally, the transition can be rocky for t… Continue reading UEM: Improving Device Security for Remote Workers