October 19, 2016 | by Ed Stone
There is a bulls-eye on the healthcare industry, and hackers are zeroing in on the target. The number of cybercrime incidents that evade traditional security defenses are increasing at an alarming rate because the data stored in Electronic Health Records is a lucrative currency to hackers. Some cyber-risk experts have cited that one Electronic Healthcare Record can go for as high as $500 on the dark web, so it is no wonder that Healthcare is among the most frequently pursued cyberattack targets.
October 13, 2016 | by John Dimaggio
While no healthcare organization is immune to cyber-attack, those that implement precautions can either significantly reduce their chances of attack, or at the very least, mitigate the damage in the event of an attack. Administrative defenses are a key component of cybersecurity because they cover the gap that technical defenses cannot protect. In fact, some common cyber-crime entry points are those that technical defenses simply can’t thwart, such as social engineering ploys and phishing expeditions.
October 5, 2016 | by John Dimaggio
Cyber-risk in the healthcare industry is not just an issue for IT Departments, it is a major problem for healthcare executives and stakeholders. The technical security defenses employed by an IT Department cannot fully protect an infrastructure, because cyber criminals are adept at exploiting those defenses or finding alternate points of entry. Cyber-crime threatens a provider’s legal, financial, reputational and operational position, making it a corporate challenge that requires executive and board-level oversight.
September 8, 2016 | by John Dimaggio
For more information on how you can best protect your organization from social engineering scams, download our Cybersecurity eBook by clicking on the below link:
September 1, 2016 | by John Dimaggio
Healthcare providers are among the most frequently pursued cyberattack targets, largely because the data stored in their systems has become a lucrative currency to hackers.
August 26, 2016 | by John Dimaggio
Healthcare organizations face a rising threat of malicious attacks that target protected health information. The trend continues to escalate, despite efforts to shore up healthcare security. Motivated by a combination of lucrative pay-offs for stolen health information and generally weaker defenses compared to other industries, hackers are developing enhanced proficiency in identifying and exploiting security vulnerabilities in healthcare IT. The threat looms from all directions, but the most common points of entry are internet, social media, e-mail, mobile devices, USB’s, and cloud and network infrastructure.
August 18, 2016 | by John Dimaggio
Literally hundreds of times per day, hackers worldwide are using the internet to probe your corporate IT structure in search of vulnerabilities. These touches are conducted with methods so sophisticated that the hackers are able to hide their intentions. Their objective however is clear: the exploitation of sensitive data for either profit or bragging rights.
July 13, 2016 | by John Dimaggio
Do your employees ever use mobile devices for work related functions? If so, keep in mind that failure to comply with HIPAA mobile device regulations can result in significant fines. Non-compliance can also generate negative publicity and reputational damage that can be difficult to recover from, as well as instigate Office for Civil Rights investigations and corrective action plans.
May 18, 2016 | by John Dimaggio
The number of healthcare breach incidents that evade traditional security defenses are increasing at an alarming rate. Motivated by lucrative pay-offs for stolen health information, hackers are developing increasing proficiency in identifying and exploiting security vulnerabilities in healthcare IT. So how can you best fortify your organization’s security controls to defend against cyber threats?