When a Data Breach Hits, Don’t Negotiate with Attackers! New Findings Show that Over One-Fourth of U.S. & UK Healthcare Organizations Pay Ransomware Demands

Nov 20, 2017 - According to a report from Health IT Security, more than one-fourth of healthcare organizations in the United States and the United Kingdom would pay a ransomware demand as a way of mitigating the impact of a cyberattack. The survey’s findings showed that many healthcare IT professionals lack the confidence in their organization’s infrastructure to respond to and manage cyberattacks. This is a troubling reality, as no healthcare organization should have to negotiate with intruders to recover their protected data.

Read More

etherFAX Integrates ECIES Encryption into Network

Nov 14, 2017 - etherFAX today announced the integration of end-to-end encryption to its hybrid cloud fax network using methods defined by the Elliptic Curve Integrated Encryption Scheme (ECIES) standard. This encryption standard defines means to secure and transfer information between two endpoints. Based on Elliptic Curve Cryptography, each transaction begins with the exchange of public keys, allowing "shared secrets" to be generated to seed the encryption process with unique keying material only known to the endpoints. Information is further protected through signing and authentication mechanisms to assure the validity of the data in transit.

Read More

etherFAX Brings ECIES Encryption to its Delivery Network

Nov 06, 2017 - Just a few short years ago, etherFAX began to change the shape of fax communications with the introduction of its Secure Exchange Network (SEN), a platform that allows “etherFAX-aware” endpoints to communicate both digitally and securely. Raising the bar further, etherFAX now brings true end-to-end encryption to its network using methods defined by the ECIES (Elliptic Curve Integrated Encryption Scheme) standard to subscribers through its APIs. Introducing, SENx.As the name implies, ECIES is a hybrid encryption “scheme” that defines methods to secure and transfer information between two endpoints. These methods start with the use of Elliptic Curve Cryptography to generate a shared secret between peers to seed the encryption process with unique keying material while further protecting the information using signing and authentication mechanisms to assure the validity of the data in transit.

Read More

Are Your Data Breaches Coming from Within? New Report Finds Most Healthcare Security Pitfalls Stem from Unintended Disclosure in 2017

Oct 24, 2017 - According to a research report from Beazley, and as reported in Health IT Security , 41% of healthcare data breaches over the first nine months of 2017 stem from instances of unintended disclosure. Within a hospital or other organization, the term “unintended disclosure” refers to erroneous practices where confidential information is either explicitly divulged without permission or left vulnerable for unauthorized parties to access. Examples include sending emails containing PHI, leaving private servers publicly accessible, or using unsecured IoT devices in the workplace to access protected files.

Read More

Is Your Healthcare Organization at Risk? How to Monitor Devices and Perform Risk Assessments to Stay Protected

Oct 16, 2017 - Performing a risk assessment not only helps to ensure healthcare organizations are in compliance with HIPAA requirements, it also brings awareness to potential areas where an organization may be putting protected health information (PHI) at risk. Healthcare providers need to frequently analyze and track where PHI is stored and always know exactly who has access to the information. Nowadays, PHI is stored on internal databases as well as mobile devices and in the cloud. This creates potential security risks for healthcare organizations as traditional security measures, such as strong passwords, are not enough to keep sensitive information protected. Advanced security procedures such as two-factor authentication and end-to-end encryption must be implemented to avoid potential data breaches and devastating consequences.

Read More

Fax isn’t Dying, it’s Growing! Report Names etherFAX a Prominent Vendor as the Online Fax Market is Projected to be Worth Billions by 2022

Sep 19, 2017 - According to a recent report released by Arizton, the global online fax market is poised to be worth more than $2.4 billion by 2022; with etherFAX named as a prominent vendor. Both corporate enterprises and hospitals alike find online faxing a desirable solution for document transmission for its cost effectiveness, scalability, automation capability, and increased cloud adoption. The Arizton report names these features the most prominent reasons for fax’s rising popularity in these markets; as well as in the government, education, manufacturing, and legal services sectors.

Read More

Next Page

Categories

Select News