top ten healthcare data breaches

Top Ten Healthcare Data Breaches of 2016

2016 was unkind when it comes to health care system data breaches. The top ten healthcare data breaches of 2016 affected more than 16 million people. There were more than 300 incidents of hacking and data security breaches throughout the year. The federal government tracks instances of healthcare data breaches2016 was unkind when it comes to health care system data breaches. The top ten healthcare data breaches of 2016 affected more than 16 million people. There were more than 300 incidents of hacking and data security breaches throughout the year. The federal government tracks instances of healthcare data breaches

medjacking

Medjacking is a Real Threat to Health Care Systems

Medjacking, or medical device hijacking, is a new kind of cybersecurity threat to health care systems. Medjacking involves hacking into medical devices using backdoors to access software on the device. Since many of the vulnerable medical devices, such as life-support equipment and diagnostic equipment, use older or standard operating systems,Medjacking, or medical device hijacking, is a new kind of cybersecurity threat to health care systems. Medjacking involves hacking into medical devices using backdoors to access software on the device. Since many of the vulnerable medical devices, such as life-support equipment and diagnostic equipment, use older or standard operating systems,

zero-day vulnerability

What is a Zero-Day Vulnerability?

In the realm of cyber security there are many types of attacks and vulnerability exploits that can be used by hackers to gain unauthorized access to computer systems: viruses, Trojans, malware, ransomware, fishing, and a number of different software vulnerabilities. So, what exactly is a zero-day vulnerability and what makesIn the realm of cyber security there are many types of attacks and vulnerability exploits that can be used by hackers to gain unauthorized access to computer systems: viruses, Trojans, malware, ransomware, fishing, and a number of different software vulnerabilities. So, what exactly is a zero-day vulnerability and what makes

hackers gain access

How Do Hackers Gain Access to Computer Systems?

For many, the concept of system hacking is foggy, and few know how hackers gain access to computer systems. Cyber attacks have been evolving for decades. Once regarded as exploratory curiosity, hackers would access systems without permission only to see if they could. Hacking has converted over time into aggressiveFor many, the concept of system hacking is foggy, and few know how hackers gain access to computer systems. Cyber attacks have been evolving for decades. Once regarded as exploratory curiosity, hackers would access systems without permission only to see if they could. Hacking has converted over time into aggressive

New York Cybersecurity Regulations

Update: New York Cybersecurity Regulations Delayed

New York cybersecurity regulations were to take effect on January 1, 2017, as proposed by New York Governor Andrew Cuomo, which we wrote about here. But after leaders in the financial community voiced concern over the rules in late December, the effective date for the new cybersecurity regulations has been pushedNew York cybersecurity regulations were to take effect on January 1, 2017, as proposed by New York Governor Andrew Cuomo, which we wrote about here. But after leaders in the financial community voiced concern over the rules in late December, the effective date for the new cybersecurity regulations has been pushed

yahoo data breach

Yahoo Data Beach: One Billion Users Exposed

The Yahoo data breach is one of the largest cyber security hacks to happen to date. Yahoo recently announced that it was the victim of a cyber attack in August of 2013, and this revelation could have an impact on Yahoo’s potential sale to Verizon. Yahoo revealed that more than oneThe Yahoo data breach is one of the largest cyber security hacks to happen to date. Yahoo recently announced that it was the victim of a cyber attack in August of 2013, and this revelation could have an impact on Yahoo’s potential sale to Verizon. Yahoo revealed that more than one

cyber security best practices

Cyber Security Best Practices

Attention to Detail and Diligence are Critical When Dealing with Cyber Security If the data breaches of the last couple of years are any indication, cyber security and data breaches will continue to make headlines in 2017. Most data security breaches are the result of an oversight somewhere in theAttention to Detail and Diligence are Critical When Dealing with Cyber Security If the data breaches of the last couple of years are any indication, cyber security and data breaches will continue to make headlines in 2017. Most data security breaches are the result of an oversight somewhere in the

popcorn time ransomware

New Ransomware Offers Victims a Hobson’s Choice: Pay Up or Infect Two Colleagues

There is a new ransomware making the rounds that offers victims a Hobson’s choice: Popcorn Time ransomware. This ransomware gives the victim a choice: either pay the ransom amount to gain access to his or her data, or choose to pass the ransomware on to two unsuspecting colleagues. It hardlyThere is a new ransomware making the rounds that offers victims a Hobson’s choice: Popcorn Time ransomware. This ransomware gives the victim a choice: either pay the ransom amount to gain access to his or her data, or choose to pass the ransomware on to two unsuspecting colleagues. It hardly

new york cybersecurity regulations

New York Imposes New Cybersecurity Regulations

Effective January 1, 2017, banks, financial institutions, and insurance companies in New York will be required to comply with new cybersecurity regulations. The New York cybersecurity regulations are closely aligned with the Center of Internet Safety’s 20 CIS Controls. The CIS controls are the industry standard when it comes to cybersecurity andEffective January 1, 2017, banks, financial institutions, and insurance companies in New York will be required to comply with new cybersecurity regulations. The New York cybersecurity regulations are closely aligned with the Center of Internet Safety’s 20 CIS Controls. The CIS controls are the industry standard when it comes to cybersecurity and

quest diagnostics data breach

Quest Diagnostics Data Breach: Another Healthcare Hack

The Quest Diagnostics data breach is the most recent health care entity to be affected by security hack in 2016. In late November, Quest Diagnostic, a medical laboratory company used by countless health care entities nationwide, announced that it had recently identified itself as a victim of a data breach. AccordingThe Quest Diagnostics data breach is the most recent health care entity to be affected by security hack in 2016. In late November, Quest Diagnostic, a medical laboratory company used by countless health care entities nationwide, announced that it had recently identified itself as a victim of a data breach. According