Encrypt Everything: Encryption and Access Controls are Primary Defenses for Data

Feb 12, 2018 - The most recent Thales Data Threat Report, issued in conjunction with 451 Research, found that digitally transformative technologies are shaping the way organizations do business. Ninety-four percent of organizations use sensitive data in cloud, big data, IoT, container, blockchain and/or mobile environments. Unfortunately, as more organizations move toward digital environments – data breaches are now at an all-time high. Out of 1,200+ IT senior security executives surveyed in eight countries, 36% of respondents were already breached in 2018. To combat cyberattacks, organizations have adopted security technologies to protect data at rest and data in transit. Seventy-seven percent of respondents cited data at rest security solutions as being most effective at preventing breaches, with network security (75%) and data-in-motion (75%) following close behind.

Read More

Build Up the Defenses! Security Spending is a Top Trend for Healthcare Execs in 2018

Jan 29, 2018 - It’s no secret that the healthcare industry has faced many security challenges over the last year. A 2017 report found that 41% of healthcare data breaches that year stemmed from unintended disclosure by organizational staff. Thankfully, 2018 is starting to look like a year where the healthcare industry will be taking a more proactive approach to cybersecurity strategies. Cyber Security Hub has recently reported that 90% of healthcare IT pros are raising their cyber security budgets. HealthcareScene also reported that nine out of ten health systems said that they increased spending on cybersecurity technology.

Read More

Take Action Against Cybersecurity Threats

Jan 23, 2018 - The American Health Information Management Association (AHIMA) recently launched a healthcare cybersecurity action plan after research from Accenture and the American Medical Association (AMA) found that 83 percent of physicians reported they have experienced a cybersecurity attack. The report signaled an urgent call to action for the healthcare sector to increase cybersecurity and the American Health Information Management Association didn’t waste any time in crafting a plan. Their full document, titled “AHIMA Guidelines: The Cybersecurity Plan,” stresses the importance of encrypting work stations, smartphones, tablets, and portable media, the importance of utilizing advanced security endpoint solutions and the need to implement a disaster recovery plan.

Read More

Peripheral Devices Need Protection Too – Securing Sophisticated Printers in the Age of Heightened Cyberattacks

Dec 20, 2017 - Healthcare organizations too often take a singular, tunnel-vision approach to their data security practices. According to a report by Health Data Management, most organizations tend to prioritize securing their network and its perimeters with little attention paid to protecting peripheral PHI access points like sophisticated printing devices. A truly HIPAA compliant data security strategy requires a holistic approach that extends beyond an organization’s network and perimeters. Peripheral access points like sophisticated printers require as much attention as the core network itself.

Read More

Why ECIES Encryption Trumps HTTPS

Dec 04, 2017 - When it comes to end-to-end encryption, HTTPS is not enough keep data secure. Unfortunately, HTTPS has many limitations and hackers are increasingly imitating the distinct padlock symbol to make fraudulent sites appear secure. Another major flaw with HTTPS is that it fails to encrypt data at rest, which puts endpoint security at risk. Although it may seem as if your data is secure with HTTPS, you must be aware that it is not fully encrypted. To guarantee data is secure at each endpoint of transmission, it is vital to utilize well-defined end-to-end encryption methods such as those defined in the Elliptic Curve Integrated Encryption Scheme (ECIES).

Read More

When a Data Breach Hits, Don’t Negotiate with Attackers! New Findings Show that Over One-Fourth of U.S. & UK Healthcare Organizations Pay Ransomware Demands

Nov 20, 2017 - According to a report from Health IT Security, more than one-fourth of healthcare organizations in the United States and the United Kingdom would pay a ransomware demand as a way of mitigating the impact of a cyberattack. The survey’s findings showed that many healthcare IT professionals lack the confidence in their organization’s infrastructure to respond to and manage cyberattacks. This is a troubling reality, as no healthcare organization should have to negotiate with intruders to recover their protected data.

Read More

Next Page

Categories

Select News