What steps can organizations take to help ensure they're not the next victim of a ransomware attack? Technology expert Craig Musgrave of The Doctors Company, which offers cyber insurance, identifies the top priorities.
As Medstar Health completes its recovery from a recent malware attack that led to a temporary shutdown of most of its systems, other U.S. hospitals continue to struggle with similar attacks, many of them involving ransomware. What risk mitigation steps are most essential?
Revelation of 321 attempts to place ransomware on federal government computers in the second half of last year raises a number of questions about the effectiveness of the Einstein intrusion detection and prevention system as well as how the government responds to such attacks.
Federal regulators have issued new guidance urging healthcare organizations and business associates to bolster their cyberattack defenses. The advice comes after a string of recent high-profile attacks on hospitals.
Despite all the funds you may have spent on state-of-the-art security software, the bad guys are just one gullible user click away from staging an all-out invasion. Find out what the true best practices are for security awareness training - those that establish a human firewall to effectively block hackers and...
The Indian restaurant rating website Burrp was one of the recent targets for ransomware. With such incidents predicted to see a surge, experts put forth strategies to defend against ransomware and share lessons on how to minimize risks.
David Finn, a former healthcare CIO, says he agreed to join a new Department of Health and Human Services cybersecurity task force because he supports its mission of involving representatives of all healthcare sectors in the effort to tackle challenges. In this interview, he outlines key security issues.
When an organization suffers a data breach, a number of challenges, impacts, and business decisions contribute to the total of all the associated costs. The scope extends beyond a fixed dollar-per-stolen-record calculation, as it invariably includes expenditures for new security measures, legal fees, third-party...
The recent surge in ransomware attacks on hospitals has at least one member of Congress contemplating whether HIPAA's breach notification requirements need to be clarified or updated to reflect the trend.
The landscape, as it relates to security has certainly changed since my first HIMSS Conference in 2008. I recall walking the exhibit hall discussing multi-factor authentication and identity management only to receive blank stares or interesting comments from prospective partners and customers. I heard, "we use...
Enterprises are pouring billions of dollars into preventing threat actors from infiltrating the organization. Yet, the rising level of breaches shows that dedicated threat actors will penetrate the organization. Perhaps then the problem is not a technological one, but is rather one of strategy in dealing with...
Smaller hospitals and clinics must avoid the common mistake of thinking they won't fall victim to cyberattacks, warns risk management expert Tom Andre, vice president of information services at the Cooperative of American Physicians.
As ISMG's Data Breach Summit Asia 2016 in Bangalore wrapped up, security practitioners seemed excited to seek answers from experts on the challenges bothering them while putting a breach response plan in place.
A new report suggests that a Chinese cyber espionage APT attack group is behind a string of targeted ransomware infections that have slammed U.S. firms. Dig into the details, however, and the report is nothing but speculation, two security experts caution.
Advanced attacks are out, while persistent, relatively simple attacks are in. Despite all of the APT hype in recent years, cybercriminals, and especially nation-state attackers, prefer to keep things simple. Information security experts explain why.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.