In a recent Article published by AT&T entitled “What every CEO needs to know about Cybersecurity,” a call to action is made of CEOs and board members for proactive engagement of their organization in adopting a more Risk-Driven Approach in light of the increasing cyber-security attacks in healthcare. Continue reading Leadership in Healthcare and Cyber-Security
Is it a HIPAA Risk Assessment or a Gap Analysis? And Why Does It Matter?
on Aug 5, 2016 10:00 AM PST at: http://www2.lumen21.com/riskassesment-or-gap-analysis
Ask any IT department what is required to comply with the HIPAA Security Rule, and you’ll likely hear things like data encryption, unique user IDs, and strong passwords. You might even hear about documented policies, anti-virus software, and removable media controls. But you are less likely to hear about the first required specification in the HIPAA Security Rule, a risk analysis. Continue reading HIPAA Risk Assessment or a Gap Analysis? And Why Does It Matter?
A recent 2016 Ponemon’s 2016 Cost of Data Breach Study: Global Analysis reveals the average total cost of a data breach for the 383 companies participating in the research increased from $3.79 million to $4 million. They found that the average global cost of data breach per every lost or stolen record is $158. Healthcare organizations, however, had an average cost of $355 per record, according to the new survey. Continue reading Adding a key component to your Arsenal of Defense against Data Breaches
In a recent article that appeared in Healthcare IT News, HyTrust, a company specializing in encryption for storage and virtual environments, conducted that found there was a rise in the percentage of Healthcare organizations planning on moving some of their applications to the cloud. Continue reading Increase Cloud Adoption Formula in Healthcare with greater Peace of Mind
With the rising number of scams in the digital world, the number of Tech Support Scam complaints reported to the Internet Crime Complaint Center (IC3), just between January 1, 2016 and April 30, 2016 reached 3,668.
A Tech Support Scam is when an attacker calls pretending to be a technical support person associated with a legitimate-sounding, but phony, third-party provider. These folks, called scammers, will try and convince you to give them remote access to your device using their social engineering skills. If the device is a phone or a tablet, the scammer will ask you to connect it to a desktop or a laptop. Once the scammer has remote control of your device, the scammer will claim to have found multiple viruses or scareware on the device and will tell you that it needs to be fixed immediately. The scammer will try and convince you to pay a fee with a personal check, debit/credit card or wire transfer the payment. Continue reading Tech Support Scams: A deceptive way to con people
During the 2012 LinkedIn data breach, about 6.5 million user account passwords were said to have been compromised, but the recent revelation of 117 million account passwords being compromised has sent a new wave of concern amongst LinkedIn users. Continue reading IDs for “Sale”: Is your LinkedIn account safe?
A fresh wave of spear phishing has hit the markets with a newly themed scam called “Secure Doc”.
Spear phishing is considered to be the most specific type of phishing attack, as it’s directly targeted at an individual or an organization. This form of phishing has become one of the most prevalent phishing techniques and has seen an exponential rise with the highest success rates. Continue reading Secure Document Phishing Attacks
The news continues to be filled with cases of ransomware and data breaches. C-level executives ask regularly about their organizations’ security, as well as their compliance posture. Continue reading Office 365+
The Federal regulators from HIPAA have issued new guidelines for the healthcare organizations to augment their defenses for cyber security. The Department of Health and Human Services Office for Civil Rights (OCR) outlined steps to avoid falling victim to the rising threats. The guidance was issued to prevent the spread of malware, following several attacks that affected the health care industry, so much as to temporarily shut a 10-Hospital system network. Continue reading New guidance for preventing healthcare cyberattacks