Most of our customers just ‘take our word’ about their network security vulnerabilities. While respecting our security credentials, some decide not to take preventative action. They don’t fully understand how their vulnerabilities can be exploited by the bad guys. One particular entrenched vulnerability is called distributed denial of service attack (DDoS). In nontechnical terms, I’m going to explain how this vulnerability is now being used to steal your protected company information.
A DDoS attack is staged by a hacker using multiple ...
The FBI’s perspective on Healthcare security? – Vulnerable. Why should you care? Because, according to the FBI, healthcare data is far more valuable to hackers on the black market than credit card numbers because it tends to contain details that can be used to access bank accounts or obtain prescriptions for controlled substances. Cyber criminals are getting paid $20 for health insurance credentials on some underground markets compared to $1 to $2 for U.S. credit card numbers.
Many doctors that manage their ...
HITRUST is a resource I use to keep current on information security as it relates to healthcare. In addition, it is an organization that supports the belief that information security should be a “core pillar of, rather than an obstacle to, the broad adoption of health information systems and exchanges.” HITECH has established the CSF (common security framework) that can be used by any and all organizations that create, access, store or exchange personal health information. It provides an even ...