This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Cyberattacks targeting the healthcare sector have surged because of the COVID-19 pandemic and the resulting rush to enable remote delivery of healthcare services. To read this article in full, please click here (Insider Story)
Cyberattacks targeting the healthcare sector have surged because of the COVID-19 pandemic and the resulting rush to enable remote delivery of healthcare services. To read this article in full, please click here (Insider Story)
Hackers are putting a bullseye on healthcare. Experts explore why hospitals are being singled out and what any company can do to better protect themselves.
The cybersecurity mantra at Jefferson Health is “if we can’t do it well, we’re not going to do it” says Mark Odom, CISO of the Philadelphia-based healthcare organization. Get the latest from CSO by signing up for our newsletters. ]. Learn the 7 keys to better risk assessment. | The pandemic accelerated things of course.”
Palo Alto Networks today rolled out a new Medical IoT Security offering, designed to provide improved visibility, automated monitoring and more for hitherto vulnerable healthcare IoT frameworks, thanks to machine learning and adherence to zero trust principles.
An analysis of customer data collected by content delivery network and internet services giant Akamai found that attacks targeting web applications rose by 137% over the course of last year, as the healthcare and manufacturing sectors in particular were targeted with an array of API and application-based intrusions.
But few lived it like the healthcare industry did. Anyone running a business is likely familiar with the phrase “building the plane as you’re flying it.” And through the craziness of the past 19 months, many of us lived the phrase, becoming pilots and engineers of our new realities overnight.
Get the latest from CSO by signing up for our newsletters. ]. Today he’s thankful that executives and the board at Abacus Insights, a healthcare-specific data integration platform where he now leads IT security, “happened to be very security savvy,” but many boards today are not. Should we be concerned?
More than half (53%) of the IoT (internet of things) and internet of medical things (IoMT) devices used in healthcare contain critical cybersecurity risks, according to The State of IoMT Device Security report by Cynerio, which analyzed devices from more than 300 hospitals in the US.
Global events over the past few years have disrupted how healthcare professionals approach the measurement and monitoring of a patient’s vital signs. To read this article in full, please click here
Over the last decade, healthcare has offered new lines of services such as telehealth and remote patient monitoring, expanded accessibility and ease for both patients and healthcare professionals, and supported innovations that measurably improve patient outcomes. It’s a profound digital transformation.
This last year our team has seen more sophisticated cyber threats targeted towards healthcare organizations than ever before. Some you've probably heard on the news, some have been kept quietly under wraps.
Like all healthcare providers, US-based Northfield Hospital has a big responsibility when it comes to cybersecurity as sensitive data and the lives of patients could be at stake. To read this article in full, please click here
It is not news that healthcare organizations are in the crosshairs of cyberattackers looking to steal valuable personal information. Geographically dispersed healthcare organizations also face a particularly complex set of challenges to their cybersecurity and network operations.
Surprisingly, today’s retirement homes, assisted living centers, and senior healthcare settings are often hubs of technology. Unfortunately, this growth of digital endpoints is matched by an increase in cyber threats, with 43% of healthcare organizations having experienced a ransomware attack in recent years.
The healthcare industry remains a prime target for cybercriminals. In 2020, more than 29 million healthcare records were breached—a 25% increase over 2019, according to the HIPAA Journal. These sorts of statistics keep healthcare security leaders awake at night.
The agencies assert that North Korean state-sponsored cyber actors have used the malware since at least May 2021 to target healthcare and public health sector organizations. For that reason, the FBI and other agencies issuing the advisory maintain the state-sponsored actors will continue to target healthcare organizations.
It has the potential to disrupt life and prevent people from accessing basic services, including healthcare. Incidents such as the Colonial Pipeline attack show that this type of criminal activity can impact not just specific organizations that lack good security practices, but every citizen.
Source: ISACAs Tech Workplace and Culture 2025 report, March 2025) For more information about recruiting and retaining cybersecurity professionals: 10 Ways to Boost Cybersecurity Talent Retention (InformationWeek) 60% of cybersecurity pros looking to change employers (CSO) The cybersecurity industry has an urgent talent shortage.
Conti has been one of the most aggressive ransomware operations over the past two years and continues to victimize many large companies as well as government, law enforcement and healthcare organizations. To read this article in full, please click here (Insider Story)
While in past years, InfoSec was previously the focus and CISOs were the norm – we’re moving to a new cybersecurity world order that expands the role of the CISO to a CSO (Chief Security Officer). 5G, over time, will move everything to the edge – wherever an organization is defining its edge.
The Protecting and Transforming Cyber Healthcare (Patch) Act has been praised by healthcare organizations. The ability of cyber-attackers to access a healthcare provider's network environment through security gaps or vulnerabilities is increasing.
industry, notably Colonial Pipeline in May, and have afflicted hundreds of healthcare and educational institutions. These actions were undertaken to stem the alarming and growing tide of ransomware attacks that have hit U.S. To read this article in full, please click here
The vulnerabilities affect the Translogic PTS system made by Swisslog Healthcare, which according to the manufacturer, is used in over 2,300 hospitals in North America and over 3,000 worldwide. The flaws could enable attackers to sabotage or hold the systems hostage, which can potentially have a negative impact on patient care.
The combination of IoT, 5G, cloud, data analytics, quantum computing, and AI paves the way for new and improved products and services in the energy, transportation, manufacturing, healthcare and logistics industries, to name a few. To read this article in full, please click here (Insider Story)
The security of critical infrastructure has been high on the agenda in 2023, with cyberattacks and other risks posing a persistent threat to the technologies and systems relied upon for essential services such as energy, food, electricity, and healthcare.
He has been in the information security and technology field for the past 20 years working in education, financial, telecommunication, healthcare, and insurance sectors. Fred Kwong is VP and CISO at DeVry University and is based in Chicago, IL. He also serves as an adjunct faculty member at Roosevelt and Benedictine Universities.
It’s important to understand I’m here to protect this company that is focused on human healthcare. “It’s like I raise my hand [in an oath] every morning and the mission is to protect and ensure the viability of my company in the cyber world,” says Allison, who has been the CISO at Johnson & Johnson for more than 12 years.
Private data centers, co-locations, public data centers, software-as-a-service (SaaS), and unified communications as a service (UCaaS) are all valuable options for healthcare IT organizations as they navigate the ever-changing demands for delivering innovative applications and services that impact patient care.
A vulnerability found in an interaction between a Wi-Fi -enabled battery system and an infusion pump for the delivery of medication could provide bad actors with a method for stealing access to Wi-Fi networks used by healthcare organizations, according to Boston-based security firm Rapid7.
If I go to a CSO and say, ‘We can secure your APIs,’ he’ll say, ‘Great, can you also find them for me?’ ” observed Dwivedi, Data Theorem’s founder. This is essential in industries that are heavily regulated and store very sensitive data, like healthcare and finance. And that’s just one phone. Velocity without security.
Research from YouGov finds that poor offboarding practices across industries including healthcare and tech are putting companies at risk, including for loss of end-user devices and unauthorized SaaS application use.
Ransomware gangs accelerated their attacks on healthcare, education, and business organizations, culminating in significant incidents that brought down leading U.S. oil pipeline company Colonial Pipeline and the North American operations of a major meat supplier, JBS.
HIPAA (the Health Insurance Portability and Accountability Act ) is a law passed in 1996 that transformed many of the ways in which the healthcare industry operated in the United States. HIPAA summary: What is HIPAA?
The almost overnight shift to remote work meant everyone from employees, to students, to healthcare workers had to connect to their business networks from outside. To accommodate the need for social distancing, countless organizations had to reconfigure everything from their business models to their networks.
The firm surveyed 492 DFIR professionals in North America and Europe, the Middle East, and Africa working in organizations in industries such as technology, manufacturing, government, telecommunications, and healthcare.
They target multiple industries simultaneously, including manufacturing, financial services, technology, retail, healthcare, energy, and media." To read this article in full, please click here
According to the most recent NETSCOUT Threat Intelligence Report , vital pandemic industries such as ecommerce, streaming services, online learning, and healthcare all experienced increased attention from malicious actors targeting the very online services essential to remote work and online life.
The data includes names, Social Security numbers, and addresses along with 400 GB of stolen files from the healthcare organization’s server, according to a post on Hive’s dark web site. The PHC has confirmed “anomalous activity on certain computer systems within its network.”
As COVID-19 has continued, threat intelligence researchers have seen an evolution in ransomware attacks targeting those most impacted, such as hospitals and healthcare providers. This technique often correlates with social trends or events, such as the pandemic.
His credentials were earned in such diverse industries as healthcare, finance, energy, consumer products, and telecommunications. Fun fact: my six years as CSO of Trexin is my first official full-time security role! Question: What encouraged you to join your current company?
Critical vulnerabilities in a software agent that's used for remote management could allow hackers to execute malicious code and commands on thousands of medical and other types of devices from healthcare, manufacturing and other industries.
South Carolina headquartered Blackbaud provides donor relationship management software to various non-profit organizations, including charities, higher education institutions, K-12 schools, healthcare organizations, religious organizations, and cultural organizations. To read this article in full, please click here
It also provides an overall assessment of the global state of DFIR across industries, with the three most prominent being financial services, healthcare, and technology. State of Enterprise DFIR highlights the impact of hybrid work and the growth of data volume on digital forensics incident response (DFIR) teams.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content