Healthy InfoSec

By don kasprzak | Cybersecurity across healthcare

Why penetration testing is key to protecting networks

A decade ago, most enterprises in the U.S. did not properly understand what penetration testing was. Even in recent years, most healthcare …

Information Security

Despite advancements, training and fears of breaches, employees still practice bad cyber hygiene, study

Employment

HealthEquity breach affects 23,000 individuals

HealthEquity, a custodian of more than 3.4 million health savings accounts, has had a data breach after one employee’s email account was accessed by …

Health Information

HealthEquity breach exposes PII of 23,000 customers

About 23,000 accounts have been compromised by a data breach that took place at HealthEquity when an employee fell for a phishing scam.

Identity Theft

$4.3 Million HIPAA Penalty for 3 Breaches

MD Anderson Cancer Center Cited for Unencrypted Devices Marianne Kolbasuk McGee (HealthInfoSec) • June 18, 2018<p>A lack of device encryption will cost …

IT

Major Vulnerabilities in Foscam Cameras

For the past several months, VDOO’s security research teams have been undertaking broad-scale security research of leading IoT products, from the …

Information Security

Critical Flaws Expose 400 Axis Cameras to Remote Attacks

<b>Roughly 400 security cameras from Axis Communications are affected by several vulnerabilities, including critical flaws that can be chained to take</b> …

Information Security

macOS Breaks Your OpSec by Caching Data From Encrypted Hard Drives

Apple's macOS surreptitiously creates and caches thumbnails for images and other file types stored on password-protected / encrypted containers (hard …

Information Security

Medical Billing Needs Revenue Cycle Management Transparency

Transparency

Exploring the Fundamentals of Medical Billing and Coding

Medical billing and coding translate a patient encounter into the languages used for claims submission and reimbursement.<p>Billing and coding are …

Digital Health

MIT Says New 3D Printing Technique Could Revolutionize Medical Procedures

Support the news<p>MIT engineers are using 3D printing and magnets to revolutionize how medical procedures are performed.<p>Researchers have infused …

Particles

Rootkit-Based Adware Wreaks Havoc Among Windows 10 Users in the US

When it was released back in 2015, one of the main perks of Windows 10 was the improved security features that made it harder for rootkits to get a …

Windows 10

Guidance: Obtaining Patient Consent to Use PHI in Research

New HIPAA Guidance Was Called for Under the 21st Century Cures Act Marianne Kolbasuk McGee (HealthInfoSec) • June 15, 2018<p>Addressing an important …

Digital Health

How Google, Microsoft, Apple Are Impacting EHR Use in Healthcare

Large technology companies are likely going to continue to affect EHR use in healthcare, especially as they file healthcare patents and develop …

Digital Health

Secure Texting Becoming 1st Choice for Sending Healthcare Data

Secure texting is becoming the first choice to send information while keeping sensitive data secured, according to a survey of 770 hospital …

Digital Health

SecurityBrief NZ - Cyberthreats shifting with ransomware attacks down - research

2017 was widely billed as the year of ransomware, but cyberthreats have moved in a new direction this year, according to ISACA’s State of …

Cybersecurity

Ransomware, Corporate Extortion Key Concerns for CIOs in 2018, Survey Finds

Chances that ransomware will go away any time soon are slim, so security experts can’t emphasize enough the importance for enterprises to seriously …

Cybersecurity

Language Matters When It Comes to a Data Breach

Data breaches were not going to stop just because the European Union’s General Data Protection Regulation (GDPR) went into effect May 25. One of the …

Cybersecurity

Why the Double Standard of Reporting Breaches? - Security Boulevard

Most people like to point out when things in life are not fair, often asking, “Why do I have to do it if they don’t?” Cybersecurity professionals …

Cyber-attacks

MysteryBot Android Malware Combines Keylogger, Ransomware, And Banking Trojan

A new malware that targets banking apps has hit Android devices. Names MysteryBot, the malware packs a banking trojan, keylogger, and ransomware, …

AR18-165A: MAR-10135536-12 – North Korean Trojan: TYPEFRAME

Original release date: June 14, 2018<br>DescriptionNotificationThis report is provided "as is" for informational purposes only. The Department of …

Cybersecurity

Mirai “not going anywhere”, expert warns as source code continues to spawn botnet offspring

More than 18 months after it broke new ground as a targeted attack on poorly-secured Internet of Things (IoT) devices, an IoT security researcher is …

Cybersecurity

Survey: Cybersecurity Lags in Critical Infrastructure Systems

By Editors of Power Engineering<p>A survey by cybersecurity firm Parsons indicates a pronounced lack of countermeasures to cyberattacks within …

Cyber-attacks

Remove RSod PC_Locker Red Screenlock Ransomware from Your PC

This article has been created in order to help you by explaining <b>how you can remove the RSod lockscreen ransomware</b> and how to gain access to your …

Cybersecurity

Remove RotorCrypt Ransomware – Decrypt .RAR Files

This article provides information on how to remove easily remove RotorCrypt ransomware and how to restore .RAR files without paying the ransom. …

Ransomware

WannaCry, NotPetya, and Cyberwarfare's Threat to Healthcare

When the outage hit, Daniel Ripp, MD, didn’t think much of it. He recorded his appointment notes into his Dictaphone like he had for years, and when …

Cybersecurity

Strong Opinions Voiced on Medical Device Security Challenges

Stakeholders Spotlight a Long List of Problems in Feedback to House Committee Marianne Kolbasuk McGee (HealthInfoSec) • June 14, 2018<p>The House Energy …

Medical Technology

10 Must-Know Cybersecurity Statistics for 2018

See how the latest surprising cybersecurity statistics and trends are shaping plans, spending, and priorities for 2018. Get the details.

Trends

The Security Benefits Behind the Software Defined Network

Software defined Networking is here, and there’s plenty of talk about what this means for security. As Ericka Chickowski wrote in <i>Security Must Adjust</i> …

Cybersecurity