data breach


While the scale of this data breach is alarming, the attack they suffered is not unique. Far too many organizations have adopted state of the art network designs and yet still rely on isolated second-generation security solutions and strategies to protect them. More than ever, security cannot be an afterthought. It requires planning, people, and processes combined with adaptive security technologies that can dynamically scale to today’s digital networks and automatically respond as an integrated system to address the advanced cyberthreats. [Read More]
by RSS Derek Manky  |  Sep 08, 2017  |  Filed in: Industry Trends, Security Research
Financial organizations can benefit from a change in thinking. Read this post to learn how thinking like a cybercriminal can prevent data breaches. [Read More]
by RSS Brian Forster  |  Sep 30, 2016  |  Filed in: Industry Trends
Our threat landscape is constantly evolving. As known vectors are exposed and neutralized, new methods emerge to take their places. And the current wave of advanced threats are getting increasingly better at slipping past perimeter security to reach the unprotected internal network. While edge firewalls do an excellent job of protecting the network border, they can’t help after a breach occurs. It might be malicious code that sits dormant for months before launching an opportunistic attack on critical infrastructure. Or it could be... [Read More]
by RSS Bill Mc Gee  |  Feb 24, 2016  |  Filed in: Industry Trends
Not long ago, I was ignoring the usual inflight safety message as I waited for takeoff. It's the rare airline that makes these interesting and this certainly wasn't one of them. The only phrase that ever sticks out for me relates to the oxygen masks: "If you are travelling with a child or someone who requires assistance, secure your mask on first, and then assist the other person." Now as a parent, this runs counter to every instinct I would have to make sure my kids could breathe. I get it - if I pass out, I'm not much... [Read More]
by RSS Chris Dawson  |  Jul 23, 2015  |  Filed in: Industry Trends
Internet cheating site, Ashley Madison, is making headlines this week across both mainstream and tech media for the data breach that could expose very intimate personal information for 37 million users. As with the AdultFriendFinder hack we reported on back in May, the potential damage to clients is significant. After all, Ashley Madison's slogan is "Life is short. Have an affair." A hacking group known as The Impact Team also stole data from Ashley Madison's sister sites Cougar Life and Established Men. The group is threatening... [Read More]
by RSS Chris Dawson  |  Jul 20, 2015  |  Filed in: Industry Trends
Security has typically fallen under the purview of IT, but it’s time to elevate it to a C-suite level discussion. Seemingly every time we turn around there’s something in the news or on social media about high-profile companies like Target, Sony Pictures, Home Depot and JP Morgan Chase experiencing data breaches -- making them almost commonplace and lowering their shock value as a result. Yet, that’s a compelling reason why organizations need to come together and discuss how to protect their network infrastructure. It’s no... [Read More]
by RSS Esther Shein  |  Jun 10, 2015  |  Filed in: Industry Trends
Two new high-profile hacks this week collectively exposed millions of users’ data, both more worrying than what has become a run-of-the-mill credit card breach. The reasons for concern, of course, are a bit different. The first breach, announced Wednesday, was at CareFirst BlueCross BlueShield, a major health insurance provider in Washington, D.C., Maryland, and Virginia. A relatively small 1.1 million records. According to the Washington Post, “The database the hackers accessed did not contain members' Social Security numbers,... [Read More]
by RSS Chris Dawson  |  May 22, 2015  |  Filed in: Industry Trends
Recently, I wrote about the three vectors of a healthcare cyber attack. This is the third of a three-part series examining each vector in depth with some new perspectives here at HIMSS. Recently, I’ve been writing about the three vectors of a healthcare cyber attack. Last week, I introduced the idea of the Internet of Medical Things when I talked about connected medical devices. These devices sit in hospitals and doctors’ offices, clinics and nursing homes. They range from IV pumps to CT scanners. They are, however, just the tip of... [Read More]
by RSS Ryan Witt  |  Apr 16, 2015  |  Filed in: Industry Trends
Recently, I wrote about the three vectors of a healthcare cyber attack. This is the first of a three-part series examining each vector in depth. Last month, I wrote about the three vectors of a healthcare cyber attack, ironically just before Anthem Blue Cross disclosed a massive data breach. The Anthem breach happened via the first vector, “traditional attacks and malware”, as did the Premera attack, so it’s timely to unpack this particular vector a bit further. Just about every organization, regardless of the industry in... [Read More]
by RSS Ryan Witt  |  Mar 31, 2015  |  Filed in: Industry Trends
The Premera Blue Cross hack is a reminder of the treasure trove healthcare data represents to hackers. Bank account information. Physical addresses. Email addresses. Social Security numbers. Clinical information...All exposed in the latest healthcare cyberattack. This time the target was Premera Blue Cross, a Pacific Northwest health insurer, which reported Tuesday that up to 11 million patient records had been breached. According to Premera, the breach was discovered on January 29th, the same day that Anthem Blue Cross uncovered a breach... [Read More]
by RSS Ryan Witt  |  Mar 18, 2015  |  Filed in: Industry Trends