Skip to main content

Privacy & Security

Privacy & Security
Ransomware and Dark Web email vulnerabilities have created a $1 billion industry for cybercriminals. The healthcare industry is experiencing a dramatic increase in ransomware attacks. Many unwanted infiltrations stem from compromised email credentials on the Dark Web. In fact, 63% of breaches in the US last year were the result of a compromised email accounts, making protection and recoverability paramount. By attending this webinar, you’ll see current analysis of healthcare credentials on the Dark Web, and hear how to successfully avoid ransomware damage with a rock-solid, cloud-based business continuity plan.
Privacy & Security
Another day, another breach. In a relatively unsurprising start to 2017, fines and settlements for HIPAA non-compliance are on track to break new records…again. Healthcare organizations are threatened by numerous attack vectors each and every day. New threats emerge. Old threats strike back. HIPAA-HITECH compliance is not a one-time project; it is an ongoing effort including regular risk assessments, updating procedures, adopting new technologies, controlling and monitoring access. We will discuss how IT leaders across the healthcare sector can take a proactive and engaged approach, and how encryption can help.
Ransomware
Privacy & Security
By Kevin Fu and Harold Thimbleby | 07:04 am | June 05, 2017
Healthcare security experts argue that hospitals must ensure high availability of medical devices and IT systems with practices that resemble preventing and treating disease. Because ransomware is a symptom rather than the problem. 
Privacy & Security
By Barry Caplin | 02:04 am | May 30, 2017
There is only one group responsible for the attack but the ransomware scare raised new areas of concern hospitals should know about. 
Privacy & Security
The headline story of the threat landscape in 2016 was the explosive growth of ransomware and the massive email campaigns that distributed it to healthcare organizations around the world, disrupting care capability and causing direct financial losses. Cybercriminals shifted from reliance on automated attacks and exploits to integrated social engineering, increasing the impact and effectiveness of these campaigns. From email to social media to mobile apps, cybercriminals combined sophisticated, targeted lures with broad-based distribution to carry out social engineering at scale. 
Privacy & Security
With the increasing complexity of cyberattacks, a focus on intrusion prevention and detection is not enough to stay ahead of "the bad guys". Just as every person deals with illness at some point in their lives, every organization is sure to experience a security breach. Once an attacker gets into your system, they linger on average for 200 days, representing a serious threat to sensitive data, brand reputation and most importantly patient safety. What's needed is a system that mimics our body's immune system, integrating the security tools and point products across your enterprise what's needed is a system that mimics our body's immune system, integrating  security tools across your enterprise to detect, isolate, respond, mitigate, and eradicate advanced threats. In this session join Cindy Compert, Cybersecurity Leader and CTO for IBM Data Security & Privacy- IBM Security, as she demonstrates the IBM Security Immune System and the anatomy of a cyberattack.