Take the Patients and Run
Forget identity theft, an incident in Arkansas shows that plain old competition is behind at least some medical data theft.
Forget identity theft, an incident in Arkansas shows that plain old competition is behind at least some medical data theft.
Researches from the Singapore University of Technology and Design have developed a clever method to steal data from wireless printer networks that were otherwise assumed secure.
Organizations will need to match features to security mitigations in qualifying electronic health records systems.
These three misbeliefs are still causing problems for security programs today. Is your security strategy based on any of them?
In today’s business environment, the most effective way to keep company information secure is to focus on protecting the data itself, not the ever growing number of endpoint devices used to access it.
The Joint Chiefs of Staff is investigating a hack of their unclassified email server. Is that better than a hack of their classified email? Don’t be so sure.
The hack of married person “hookup” site Ashley Madison is just the latest evidence that we need to reconsider the rewards and the risks of data in our information economy.
A leak of patient health information through a cloud-based file-sharing platform contributed to a $218,000 HIPAA fine against a Boston hospital. Medicus emptor!
Mobile devices have become part of our everyday lives. While using these devices, whether it be a smartphone, tablet, or laptop, you are at risk of being a victim of a cybercrime. Here are some tips you can use to safeguard your devices against impending attacks.
With users reportedly spending an average of 162 minutes on their mobile device every day, the amount of personal information communicated can be a treasure to a hacker. Read on to learn how to use mobile devices and the web securely and privately.