Security Boulevard’s 5 Most Read Stories for the Week, April 2-6

A new week, a new crop of security stories. Last week, sophisticated attackers, desktop security, healthcare data breaches and data security in GDPR made headlines, as well as Multi-Factor Authentication featured in the our latest cartoon series calle… Continue reading Security Boulevard’s 5 Most Read Stories for the Week, April 2-6

Healthcare Systems – Ransomware Targets

Superb accounting of the built-to-fail systems in healthcare, and the predeliction of those same systems towards victimization by ransomware attacks. Via Robert N. Charette writing at the IEEE’s Spectrum Magazine.
Permalink
The post Healthcare System… Continue reading Healthcare Systems – Ransomware Targets

Managing More Medical Images Than Ever? Learn How to Better Protect Them

If not properly secured, many of the systems health care organizations use to store and share medical images could be exploited to expose patients’ PHI.

The post Managing More Medical Images Than Ever? Learn How to Better Protect Them appeared first on Security Intelligence.

Continue reading Managing More Medical Images Than Ever? Learn How to Better Protect Them

Managing More Medical Images Than Ever? Learn How to Better Protect Them

If not properly secured, many of the systems health care organizations use to store and share medical images could be exploited to expose patients’ PHI.

The post Managing More Medical Images Than Ever? Learn How to Better Protect Them appeared first on Security Intelligence.

Continue reading Managing More Medical Images Than Ever? Learn How to Better Protect Them

Securing Medical Devices in the Age of the IoT

Both health care IT professionals and device manufacturers are responsible for securing medical devices in light of emerging IoT threats.

The post Securing Medical Devices in the Age of the IoT appeared first on Security Intelligence.

Continue reading Securing Medical Devices in the Age of the IoT

The CISO’s Guide to Minimizing Health Care Security Risks

CISOs must possess skills and expertise in multiple areas to combat health care security risks in this age of ransomware and connected medical devices.

The post The CISO’s Guide to Minimizing Health Care Security Risks appeared first on Security Intelligence.

Continue reading The CISO’s Guide to Minimizing Health Care Security Risks

Data Activity Monitoring Gives Health Care Organizations X-Ray Vision Into Medical Imaging Security Risks

Poor medical imaging security can have potentially life-threatening consequences such as delayed treatment, inaccurate diagnosis and prescription fraud.

The post Data Activity Monitoring Gives Health Care Organizations X-Ray Vision Into Medical Imaging Security Risks appeared first on Security Intelligence.

Continue reading Data Activity Monitoring Gives Health Care Organizations X-Ray Vision Into Medical Imaging Security Risks

Increased Awareness Is the Best Cure for Health Care Security Risks

Many health care security risks stem from insufficient leadership and limited resources, which can often be attributed to a lack of security awareness.

The post Increased Awareness Is the Best Cure for Health Care Security Risks appeared first on Security Intelligence.

Continue reading Increased Awareness Is the Best Cure for Health Care Security Risks

Health Care Endpoint Hygiene: A Post-WannaCry Call to Action

The idea of employing basic endpoint hygiene to keep your data safe seems like a no-brainer. So why was the WannaCry ransomware attack so damaging?

The post Health Care Endpoint Hygiene: A Post-WannaCry Call to Action appeared first on Security Intelligence.

Continue reading Health Care Endpoint Hygiene: A Post-WannaCry Call to Action

Technology Treatment Plan: The Health Care Cybersecurity Imperative

The U.S. Department of Health and Human Services established guidelines to improve the state of health care cybersecurity throughout the sector.

The post Technology Treatment Plan: The Health Care Cybersecurity Imperative appeared first on Security Intelligence.

Continue reading Technology Treatment Plan: The Health Care Cybersecurity Imperative