What Is the True Cost of a Health Care Data Breach?

The health care industry has remained the top data breach target for eleven years in a row. Highly sensitive and personally identifiable information (PII) held by health care systems is an attractive target. After all, it contains all the information used for identity theft. In addition, that data may be stored on less secure networks […]

The post What Is the True Cost of a Health Care Data Breach? appeared first on Security Intelligence.

Continue reading What Is the True Cost of a Health Care Data Breach?

What’s New in the 2021 Cost of a Data Breach Report

Has cybersecurity ever been more important than it is right now? Even in these extraordinary times, with its focus on manufacturing vaccines and getting shots into arms, new research in the Cost of a Data Breach Report shows that the increasing cost of security breaches makes preventing and responding to these threats a critical concern. […]

The post What’s New in the 2021 Cost of a Data Breach Report appeared first on Security Intelligence.

Continue reading What’s New in the 2021 Cost of a Data Breach Report

Health Care Data: It’s Your Personal ‘National Security’ Information

If you wanted to put all the pieces of a person’s profile together, health care data would likely be the most important piece of the personally identifiable information (PII) puzzle. It’s powerful. A heartbeat can open a door. This data is the most important type related to a person, the crown jewel of PII data […]

The post Health Care Data: It’s Your Personal ‘National Security’ Information appeared first on Security Intelligence.

Continue reading Health Care Data: It’s Your Personal ‘National Security’ Information

Health Care Ransomware Strains Have Hospitals in the Crosshairs

The language of digital attacks shares a lot with the language of disease: ‘viruses’ ‘infect’ computers, and stopping their spread can be like trying to keep down a contagious disease. The two worlds also come together when threat actors attack using health care ransomware. When every minute could change the fate of a patient, preventing […]

The post Health Care Ransomware Strains Have Hospitals in the Crosshairs appeared first on Security Intelligence.

Continue reading Health Care Ransomware Strains Have Hospitals in the Crosshairs

Health Care Cybersecurity: Costly Data Breaches, Ensuring PII Security and Beyond

As hospitals get smarter, threat actors have more routes inside. IBM’s recent research on the health care industry shows how smart tools, which could be very valuable for today’s medical facilities, also need healing of their own. What should hospital IT security teams look out for? Our overview of the state of cybersecurity in the health […]

The post Health Care Cybersecurity: Costly Data Breaches, Ensuring PII Security and Beyond appeared first on Security Intelligence.

Continue reading Health Care Cybersecurity: Costly Data Breaches, Ensuring PII Security and Beyond

What’s New in the 2020 Cost of a Data Breach Report

In a world of uncertainty and change, it’s a comfort that some things are consistent year after year. Now in its 15th year, the annual Cost of a Data Breach Report, with research by the Ponemon Institute and published by IBM Security, continues to provide a detailed view of the financial impacts security incidents can […]

The post What’s New in the 2020 Cost of a Data Breach Report appeared first on Security Intelligence.

Continue reading What’s New in the 2020 Cost of a Data Breach Report

Safeguarding Healthcare for the Future With Zero Trust Security

A Zero Trust security model can help healthcare organizations provision access in a more effective manner by focusing on data, workloads and identity.

The post Safeguarding Healthcare for the Future With Zero Trust Security appeared first on Security Intelligence.

Continue reading Safeguarding Healthcare for the Future With Zero Trust Security

Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity

Great healthcare cybersecurity goes beyond IT best practices. Assessing the human element is essential to developing and deploying a holistic approach to security.

The post Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity appeared first on Security Intelligence.

Continue reading Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity

Measuring Security Risk in a Medical IoT World

To reduce cybersecurity risk, silos among internet of things (IoT) technologies and hospital teams should be broken down and impact across four pillars should be weighed.

The post Measuring Security Risk in a Medical IoT World appeared first on Security Intelligence.

Continue reading Measuring Security Risk in a Medical IoT World

The Potential and Perils of the IoT in Healthcare

The IoT in healthcare is ever-expanding. This growth is bringing new capabilities and opportunities for innovation but also new challenges and security risks.

The post The Potential and Perils of the IoT in Healthcare appeared first on Security Intelligence.

Continue reading The Potential and Perils of the IoT in Healthcare