In recent years the volume of hospitals and the health sector entities that that have fallen victim to hackers has continued to rise at an alarming rate. With each breach there are empty promises and finger pointing while the organizations attempt to attribute the hack to a bad actor like Deep Panda based off of exploit kit components that were used in a previous breach. Where are they getting their information? Who knows and who cares because it's almost always wrong and attribution is typically a waste of time as it is an attempt to take the responsibility and public outrage off of the...
In recent years the volume of hospitals and the health sector entities that that have fallen victim to hackers has continued to rise at an alarming ra...
As a crucial component of our Nation's critical infrastructure, the health sector is an obvious and wide open target for bad actors. Hackers, both state sponsored and mercenary have been effortlessly pummeling our health sector networks while organizations do little to stop them. A firewall and anti-virus software will do little to stop intruders yet little, if anything, is being done to create standards to thwart a breach. Cybersecurity-centric components must be included in the curriculum of anyone studying health IT, HIPAA and healthcare informatics as these are the first victims that will...
As a crucial component of our Nation's critical infrastructure, the health sector is an obvious and wide open target for bad actors. Hackers, both sta...
Hospitals and the healthcare community as a whole have become the most common and lucrative target for cyber-attack. Many breaches are targeted and sophisticated while others are surprisingly random and simple. The Internet of Things has increased the attack surface with a host of new vulnerabilities and an alarming number of organizations lack even the most basic cybersecurity hygiene, yet everyone is surprised when there is a breach and sensitive information is exfiltrated. Bad actors come in all forms with a multitude of methods, motivations and exploits but virtually all of them start...
Hospitals and the healthcare community as a whole have become the most common and lucrative target for cyber-attack. Many breaches are targeted and so...
As hospitals and the health sector as a whole continue to take advantage of the conveniences provided by the latest IoT (Internet of Things) technologies, little attention is focused on the expansive and virtually completely unprotected attack surface evolving from use of these technologies. A cybersecurity-centric culture and an evolving enforcement of proper cybersecurity hygiene are mandatory to create even the most basic secure environment. Conversations and training centering on HIPAA, health IT and healthcare informatics must include cybersecurity, sadly it rarely does and the victims...
As hospitals and the health sector as a whole continue to take advantage of the conveniences provided by the latest IoT (Internet of Things) technolog...
With the hospital and health sectors attack surface wide open it's surprising that more isn't being done to educate staff on proper cybersecurity hygiene. The attack surface is compounded by the exponential expansion of the IoT and lack of up to date BYOD protocols. HIPAA and patient record privacy are a moot point when unpatched vulnerabilities in applications are exploited by bad actors. The healthcare industry as a whole needs to move toward a more cybersecurity-centric culture as the physical and cyber environments continue to merge. The point of this easy to intellectually digest book...
With the hospital and health sectors attack surface wide open it's surprising that more isn't being done to educate staff on proper cybersecurity hygi...