By Art Gross – Business email compromise (BEC) scams remain one of the most widely used attack vectors among cybercriminals to date. In fact, cybercriminals are finding so much success in exploiting human vulnerabilities through BEC scams that their frequencies have been dramatically increasing.
By Art Gross – A lot can happen in 5 years, and unfortunately, not always for the better. According to a recent report by Juniper Research, Cybercrime & the Internet of Threats 2018, data breaches are expected to reach 146 billion records over the next five years.
By Art Gross – Small businesses are often thought to be a forgotten entity when it comes to cybercrime. On the surface, it seems like a fair assumption that hackers wouldn’t target small businesses when there are large enterprises with much greater assets.
By Art Gross – Phishing is a cybercrime that has been around for many years, where targets are sent malicious emails claiming to be from a legitimate individual or organization to trick them into disclosing their sensitive information.
Annual Threat Report from Symantec details how simple tactics led to unprecedented outcomes. Cyber criminals revealed new levels of ambition in 2016 .
By Arman Sadeghi – According to the Brookings Institution, from late 2009 up to present times, the cost of breaches in the healthcare industry has reached $363 per record. Further, over 155 million Americans have had their medical information compromised.
By Irv H. Lichtenwald – Naturally, most of what you hear from healthcare IT companies about their products is going to be upbeat, designed to create a sense of potential and promise. I mean, I can easily extol the virtues of the company I lead and the products and services we sell.
By Irv H. Lichtenwald – Mathematically, the gap between $3.6 million and $17,000 is a chasm. This is something you know well if you’re Hollywood Presbyterian Hospital, which paid the latter number to unlock patient data held hostage by malicious hackers using ransomware.
By Mark Menke – Last year, we witnessed a number of data breaches occur within hospital networks, health insurers, physicians’ offices, and much more. In fact, Community Health Systems, Premera and Anthem were just some of the bigger names who made cybersecurity headlines in 2015, resulting in more than 94 million records exposed.
By Don Dally – Is your health system’s browser up to date? Too many organizations don’t know the answer to that question and are unaware of the consequences for using unsupported browsers. Or, if they do know the answer, they aren’t in a position to act on it.
By John Halamka MD – When I wrote about the most important healthcare IT stories of 2015 (such as ICD-10 and Meaningful Use), I did not include a discussion of Information Security. That’s because security deserves its own post. Increasingly complex threats and an array of new security technology, policy, and education projects consumed us all in 2015.
By Art Gross – The Computer Fraud and Abuse Act CFAA is not a very widely known piece of federal legislation but could help companies that have been victims of employee or ex-employee theft of digital information. According to an article over at Fox Rothschild LLP the CFAA can be used to help companies that have had employees or ex-employees steal or access unauthorized information.
OUR STREAMING RADIO STATION
HealthcareNOW Radio – Past Episodes On Demand
Miss any episodes of your favorite HealthcareNOW Radio shows? Find them all on our SoundCloud Channel. Play or Download Here
Get Our eNews Digests
EHR Incentive Program News
More Top Headlines
- Improve Transitions to Drive Outcomes Under Value-Based Care
- The 2019 Interoperability Standards Advisory Reference Edition is Now Available
- From the Desk of Matt Fisher – ICYMI
- Revenue Cycle and Payer News 1-16-2019
- Sorting out AI, ML, DL, and NLP
- See all our sites aggregated content on HealthITAnswers.net