With the advent of technology in personal healthcare - Internet-connected glucose monitors, intravenous blood pressure monitoring, personal 'best friend' emotional bots - there is a lot of highly sensitive data that is rampantly traversing the airwaves. And the impact of this data getting in the wrong hands is just...
Ransomware attacks against healthcare organizations threaten vulnerable systems that are part of a larger ecosystem. The fast propagation of ransomware attacks creates significant damage spanning beyond the infected systems, often resulting in the shutting down of healthcare operations. While cybersecurity ecosystems...
Protecting end-user devices is an essential part of any information security strategy. But many healthcare organizations have literally thousands of connected medical devices - from infusion pumps to heart monitors - used in patient treatment that can be vulnerable, opening the door to a broader cyberattack....
Ransomware has already crippled the ability of some targeted healthcare organizations to access patient records, interrupting delivery of care for days. But will the next iteration of malware attacks bring even more disruption, and perhaps have an even more devastating impact on patients? Cyberattacks involving...
Gartner, Inc. projects that 8.4 billion connected "things" will be in use worldwide in 2017. That is an increase of of 31 percent from 2016. By 2020, that number could reach as high as 20.4 billion. The Internet of Things (IoT) is no longer just a trend. It is happening now, and will have cybersecurity effects on your...
The Internet of Things (IoT) is transforming our lives and the way we do business. But for the IoT to truly fulfill its promise, it must be secured. IoT devices are notoriously vulnerable, and these vulnerabilities present opportunities for attackers to gain access to your network and install malware, steal...
When an attack strikes, the first task on-hand for anyone working in cybersecurity is to stop the disruption; the second task is to ensure that critical data is protected. And for Fortune 500 companies and other leading U.S. businesses like Hearst Corp. - a media and business information conglomerate with ownership of...
The number of Internet of Things (IoT) devices will surpass the number of people on the planet by the end of the year. These devices can potentially provide a direct conduit to some very private and valuable information in your company. In our rush to connect everything, security and privacy are often afterthoughts....
While the Internet of Things is offering new ways for enterprises to collect data to improve their businesses, it has a dark side: security. Over the past year, IoT devices have been used for devastating distributed denial-of service attacks. IoT manufacturers have been blamed for poor security controls, and companies...
Because hackers are increasingly targeting healthcare organizations in search of valuable patient information, it's more important than ever to ensure that data remains inaccessible to intruders. In addition to using the very latest techniques to fight malware, hospitals, clinics and others need to use effective...
Medical devices and their supporting ecosystem account for the vast majority of connected equipment inside the provider network, yet their risk is often not properly assessed. Without proper understanding of the threats to, vulnerabilities within and parts of a medical device ecosystem, it's almost impossible to...
Protecting end-user devices is an essential part of any information security strategy. But many healthcare organizations have literally thousands of medical devices - from infusion pumps to heart monitors - used in patient treatment that can be vulnerable, opening the door to a broader cyberattack. In this session,...
The number of IoT devices will proliferate to over one trillion in the next few years, but any device that can communicate with another potentially can provide a direct conduit from the public internet to some very private and valuable information.
In our rush to connect everything together, secure connectivity and...
The proliferation of data everywhere has spawned a collusion of topics around Big Data, Internet of Things (IoT), and the Cloud. And they all have one major thing in common - they need data protection. Considering that more 707 million data records were compromised worldwide during 2015, it is key that data protection...
The proliferation of IoT devices will is expected to grow to over one trillion in the next few years, but any device that can communicate with another over the public Internet can potentially provide a direct conduit to some very private and valuable information that these types of devices are gathering.
In our...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.