The search found 4283 results.
Nearly six months after the Texas mass ransomware attacks that took down operations at 22 small Texas cities, we still talk about it pretty regularly. That's the type of impact a mass ransomware attack can have.
Normally, the only types of epidemics that healthcare organizations fight are the microbial kind. But lately, they have been hit with a rash of ransomware attacks, crippling their IT systems and demanding payments to unlock the encrypted system.
Outsourcing offers key advantages in costs and subject matter expertise. Yet, the safety of your business data depends on IoT risk management and the security protocols of vendor partners.
Way back in 2018, the Department of Defense (DOD) reported a data breach that affected at least 30,000 military and civilian personnel. Let's take a stroll down memory lane to look at what happened in this data breach: hackers gained access through a third-party contractor that maintained travel records for the department.
The Health Insurance Portability and Accountability Act was initially passed in 1996, and it has drastically modernized the healthcare industry as well as increased security surrounding the handling of protected health information (PHI). While HIPAA has done a lot to ensure peace of mind for patients, HIPAA compliance has often become quite a headache for small to large businesses alike.
Despite large financial and time-intensive investments into access management tools and cybersecurity solutions, a business’ critical assets still remain vulnerable and prone to attack.
We're not going to be dropping new information when we say that security is important when allowing network access to external parties like vendors and contractors. Along the same lines, breaches coming from third-party access are increasing, as vendors often offer an easier way into your network than a full-frontal assault on your defenses.
According to a report from Duo Security, 56% of healthcare companies across the U.S. are still operating on legacy operating systems and software. In case you’re not familiar with the term, legacy is just another word for outdated. In the world of cybersecurity, outdated usually means vulnerable to a cyberattack.
Every healthcare organization knows about the Health Insurance Portability and Accountability Act (HIPAA). It’s part of daily life for those working in a healthcare setting, and it can be — from a cybersecurity perspective — a difficult set of regulations to navigate.
In May 2019, the American Medical Collection Agency (AMCA), a "business associate" of a number of healthcare providers, reported an eight-month data breach had exposed sensitive information for more than 20 million patients.