Opinions & Analysis

The health care industry is consistently under attack thanks to cybercriminals who eagerly attempt to snatch valuable data, costing organizations substantial financial and reputational damage. People often weigh in and wonder why the overall industry can’t sufficiently beef up its cybersecurity strategies. However, the headlines they see that alert the public about breaches and other issues don’t tell the whole story. The Health Sector Appeals to Hackers Besides the scope of the records to steal...

Read more

Data sent to a third-party vendor that was not authorized to receive it led to a data breach involving 16,500 people associated with student loans. The affected company is Access Group Education Lending, and the company became aware of the situation on March 23. What Kind of Information Was Leaked? The public doesn’t know the third-party vendor’s name, but the company is reportedly a student loan lender. That vendor got data containing student names, Social...

Read more

Data sent to a third-party vendor that was not authorized to receive it led to a data breach involving 16,500 people associated with student loans. The affected company is Access Group Education Lending, and the company became aware of the situation on March 23. What Kind of Information Was Leaked? The public doesn’t know the third-party vendor’s name, but the company is reportedly a student loan lender. That vendor got data containing student names, Social...

Read more

Two new reports from lead author Professor Nick Jennings of Imperial College London and other cybersecurity experts assert that device manufacturers have a larger burden to protect consumers from cybersecurity attacks than the device users themselves. The report points out that although it’s important for users to be as proactive as possible in that regard, many people don’t know the most effective ways to do so. It suggests using a safety mark system that acts...

Read more

We are reaping the proverbial whirlwind of our long years of relentless technological advancement. Cyber-insecurity and constant data breaches are some of the growing pains of digital and wireless technologies. And even now, the private and public sectors can’t seem to agree on how to solve it or how bad things need to get before we do. An illustrative example of this collision — between vulnerable technologies, corporate profit margins and insufficient government regulation —...

Read more

Reacting quickly to cyberattacks is a vital aspect of cybersecurity. A prompt response can be the difference between minimal damage and catastrophic data loss. Additionally, cybersecurity experts value the importance of preventive and offensive measures, whose presence is as important, if not more so, for cybersecurity professionals to master as a quick response. A quick, effective response combines with preventive measures for an ideal cybersecurity solution. Offensive Cybersecurity Measures Hackers today are sophisticated and up-to-date,...

Read more

The recent history of security clearances in the Trump White House has raised eyebrows. Jared Kushner’s clearance application contained errors and omissions of a type “never seen” by some who are close to the approval process for clearances. Another recent headline saw questions raised about Rob Porter — the former White House staff secretary — and why he was granted temporary security clearance despite FBI warnings about domestic abuse allegations in his past. It is...

Read more

Norway was among the latest successful targets for cybercriminals, and this recent attack involved health information. The victimized organization was Health South-East RHF, which manages hospitals in nine Norwegian counties in the southeastern part of the country. It received a notification on Jan. 8 when HelseCERT, a computer response team for the health sector, advised the company of suspicious traffic on their network. Then, IT professionals at Sykehuspartner HF, the parent company of Health South-East...

Read more

Norway was among the latest successful targets for cybercriminals, and this recent attack involved health information. The victimized organization was Health South-East RHF, which manages hospitals in nine Norwegian counties in the southeastern part of the country. It received a notification on Jan. 8 when HelseCERT, a computer response team for the health sector, advised the company of suspicious traffic on their network. Then, IT professionals at Sykehuspartner HF, the parent company of Health South-East...

Read more

The phrase “new normal” usually offers little comfort — particularly when stolen secrets are in the mix. It’s true. Data breaches have become so commonplace that we’re nearly numb to them. But now a new report indicates, the damage might be more widespread than any of us wanted to believe. As many as 30 percent of CEOs may have had their email credentials — including passwords and the contents of their correspondence — exposed in...

Read more
Page 10 of 37 1 9 10 11 37