Medical Device Cybersecurity Emphasis for New AEHIS/ MDISS Partnership
Oct13

Medical Device Cybersecurity Emphasis for New AEHIS/ MDISS Partnership

A new working relationship d between CHIME’s Association for Executives in Healthcare Information Security (AEHIS) and the Foundation for Innovation, Translation and Safety Science’s Medical Device Innovation, Safety and Security Consortium (MDISS) will focus on helping advance medical device cybersecurity and improve patient data security. The two groups will cooperate to aid members identify, mitigate, and prevent cybersecurity threats by issuing cybersecurity best practices, teaching about the threats to device security, training members, and promoting data sharing. For the past three years, AEHIS has been assisting healthcare groups improve their information security defences. More than 700 CISOs and other healthcare IT security leaders have availed of the education and networking...

Read More
Why You Should Use a Web Filter to Prevent Employees Accessing Pornography
Oct12

Why You Should Use a Web Filter to Prevent Employees Accessing Pornography

Many companies have realized that acceptable Internet usage policies are insufficient and do not prevent employees accessing pornography at work. While employees can be told that the viewing of pornography at work is unacceptable, and viewing pornography is likely to result in instant dismissal, it does not stop porn from being accessed at work by some individuals. The accessing of pornography in offices and other places of work is commonplace. One survey conducted by Proven Men Ministries in 2014 indicates two thirds of men and one third of women have accessed pornography using their work computers. When employees access pornography at work, it does not just reduce productivity, it can have many negative implications for employers. Further, when anonymizer services such as VPNs are used...

Read More
Internet of Things Medical Resilience Partnership Act to Provide Direction on Devices
Oct11

Internet of Things Medical Resilience Partnership Act to Provide Direction on Devices

The Internet of Medical Things Resilience Partnership Act, aimed at establishing public-private stakeholder partnership which will be tasked with developing a cybersecurity framework to prevent data breaches, has been approved by the U.S. House of Representatives. The hope is that this framework will be adopted by medical device manufacturers and other stakeholders to prevent data breaches and make medical devices more secure from cyberattacks. The range of medical devices now being employed in the healthcare industry is considerable and the number is only likely to keep increasing. As more devices are developed, the risk of harm to patients grows. These devices are currently used in hospitals, worn by patients receving treatment, fitted surgically or used in the home. The devices...

Read More
Over Half of Cloud Storage Services are Misconfigured: Report
Oct09

Over Half of Cloud Storage Services are Misconfigured: Report

A recent report by cloud threat defense firm RedLock claims more than half of businesses have made errors that have exposed sensitive data to the general public vuia the cloud. The study shows many organizations are not adhering to established security best practices, such as using multi-factor authentication for all privileged account subscirbers. Worse again, many groups are failing to constantly review their cloud environments which means data is being exposed without detection. The issue seems to worsening as RedLock’s last review for Q2 revealed 40% of businesses had misconfigured at least one of their cloud storage services – Amazon Simple Storage Service (Amazon S3) for onee. A new study, released in its most recent Cloud Security Trends Report, shows that percentage grew to 53%...

Read More
SMB IT Security Survey Reveals Confidence in Cybersecurity Defences is Low
Oct09

SMB IT Security Survey Reveals Confidence in Cybersecurity Defences is Low

A recent SMB IT security survey has revealed that while security spending has increased by 17% year over year, IT professionals are less confident in their ability to prevent data breaches. That is not surprising given that 68% have reported having experienced at least one data breach in the past 12 months, 29% of organizations experienced a phishing attack, and 18% have had to deal with a ransomware infection. The SMB IT security survey was conducted by Osterman Research on behalf of Internet security firm Cyren. When asked about the main threats and how well protected their organizations were, fewer than 50% believed their defenses were good enough to prevent threats such as phishing, ransomware, and zero-day exploit attacks. Respondents were asked about their biggest security...

Read More
Hacking Group ‘The Dark Overlord’ Attacks Another Healthcare Organization
Oct06

Hacking Group ‘The Dark Overlord’ Attacks Another Healthcare Organization

After a seemingly prolonged period of inactivity, the hacking group TheDarkOverlord has revealed another attack on a U.S. healthcare supplier, Mass-based SMART Physical Therapy (SMART PT). The hack reportedly happened on September 13, 2017, with the announcement of the data theft released by TDO on Twitter on Friday 22, 2017.  No details were given as to how access to the data was gained, although it was revealed to databreaches.net that the attack took advantage of the use of fragile passwords. The entire database of patients was reportedly obtained. Databreaches.net was provided with the patient database and has was able to  confirm that the attack was genuine. The database held a wide range of data on 16,428 patients, including contact information, dates of birth and Social Security...

Read More
Data Breaches Drop For Second Consecutive Month
Sep22

Data Breaches Drop For Second Consecutive Month

The latest report of the Breach Barometer from Protenus/Databreaches.net Healthcare shows that data violations have dropped for the second consecutive month, according to . In August, there were 33 reported healthcare data violations, down from 36 incidents in July and 56 in June. While the drop int he number of data breaches is encouraging, that is still more than one healthcare data breach per day. While it was the second best month of the year so for in terms of the number of reported incidents, it was the third worst in terms of the number of individuals impacted. 575,142 people were impacted by healthcare data breaches in July, with the figure rising to 673,934 individuals in August. That figure will rise even more as two incidents were not included in that total since it is not yet...

Read More
Imperial Valley Passes OCR HIPAA Audit With Help From The Compliancy Group
Sep19

Imperial Valley Passes OCR HIPAA Audit With Help From The Compliancy Group

The Department of Health and Human Services’ Office for Civil Rights (OCR) has investigated a Californian Physician’s group following a reported breach of protected health information. Covered entities can implement policies and procedures to prevent data breaches, but security incidents are still likely to occur. Responding correctly to those breaches and ensuring HIPAA Rules are carefully followed will help to ensure financial penalties for HIPAA violations are avoided. As with all breaches that result in the protected health information of more than 500 individual being exposed, OCR launched an investigation of Imperial Valley Family Care Medical Group (IVFCMG) when the breach summary was submitted through its breach portal. The breach in question was the theft of a laptop computer...

Read More
Piriform Alerts Users That CCleaner Contained Malware
Sep19

Piriform Alerts Users That CCleaner Contained Malware

Piriform’s CCleaner, a free PC cleaning app with 130 million users around the world, has been discovered to contain malware. Researchers at Cisco Talos recently announced that CCleaner contains a backdoor that was inserted by hackers. The backdoor was present in two versions of the application – the 32-bit version of CCleaner 5.33.6162 and CCleaner Cloud 1.07.3191. The backdoor was inserted into those versions at least a month before it was discovered, giving the hackers behind the malware plenty of time to gather information on compromised computers, of which there are many. An estimated 2.27 million users have downloaded the infected version of the application, according to Avast, which purchased Piriform this summer. Initially it was thought that as many as 3% of users may have been...

Read More
HIPAA Privacy Rule Violation Penalties Waived in Wake of Hurricane Harvey
Aug28

HIPAA Privacy Rule Violation Penalties Waived in Wake of Hurricane Harvey

Secretary of the U.S. Department of Health and Human Services Tom Price has announced that certain HIPAA Privacy Rule violation penalties will be waived in the disaster area of Hurricane Harvey in Texas and Louisiana. Following any natural disaster, hospitals and health systems must operate in difficult circumstances. During such times, it can be a major challenge to provide treatment while complying with all aspects of HIPAA Rules. With resources stretched, HIPAA Privacy Rule violations can easily occur. In emergencies situations, such as when healthcare organizations are required to assist in disaster relief efforts, HIPAA Rules must still be followed. The HIPAA Privacy Rule is not suspended in such situations, although the HHS Secretary can waive certain provisions of the HIPAA...

Read More
Webroot Acquires Securecast and Starts Offering Anti-Phishing Training
Aug21

Webroot Acquires Securecast and Starts Offering Anti-Phishing Training

Webroot, a leading provider of endpoint security systems, has announced it has acquired Securecast – A provider of a fully automated security awareness training platform. The Securecast security-awareness-as-a-service platform has been renamed Webroot Security Awareness Training, and a beta version of the platform has now been made available. Webroot will be offering the new platform to its customers to help them train their employees to be more security aware and identify and respond correctly to phishing attacks. The Webroot Security Awareness Training Platform will include a comprehensive library of training resources covering the most common attack vectors and tactics used by cybercriminals to gain access to networks and data. Training modules can be used to teach employees how...

Read More
Worldwide Cybersecurity Spending in 2017 to Exceed $86.4 Billion
Aug17

Worldwide Cybersecurity Spending in 2017 to Exceed $86.4 Billion

Gartner has released a new report predicting worldwide cybersecurity spending in 2017 will reach $86.4 billion. The information security market is now the fastest growing sector and will increase by 7% by the end of 2017. Gartner predicts growth in the sector will be similar in 2018, with spending rising to $93 billion next year. Within the infrastructure protection segment, Gartner says the biggest growth will be in security testing. Growth in emerging application security testing tools is expected to contribute to growth in the sector until at least 2021. Gartner predicts hardware support services will see slower growth as more companies switch to the cloud and SaaS. Over the course of the past 12 months, the volume of cyberattacks has grown and the impact of those attacks has been...

Read More
NIST Revises Guidance on Passwords
Aug17

NIST Revises Guidance on Passwords

The National Institute of Standards and Technology (NIST) has issued new guidance on passwords. It is standard practice to make passwords stronger by using a combination of capital letters, lower case letters, numbers and special characters. While that certainly makes it harder for cybercriminals to crack passwords using brute force methods, it also makes passwords particularly difficult to remember. In practice, forcing users to add in upper case letters, numbers and special characters to their passwords often means the first letter of a standard password is capitalized, numbers replace digits and an exclamation mark or asterisk is added to the end. Instead of ‘password,’ Password! Or P4ssw0rd! is used. Neither would be particularly difficult for a hacker to crack, yet both would likely...

Read More
HITRUST and Trend Micro Partnership to Improve Cyber Threat Xchange Capabilities
Aug15

HITRUST and Trend Micro Partnership to Improve Cyber Threat Xchange Capabilities

The Health Information Trust Alliance (HITRUST) has partnered with Trend Micro to form the HITRUST Cyber Threat Management and Response Center which will enhance the capabilities of the HITRUST Cyber Threat Xchange. The HITRUST Cyber Threat Xchange is the most widely adopted threat information sharing organization serving the healthcare industry. The HITRUST Cyber Threat Xchange provides detailed information on the latest cyber threats, allowing organizations to develop effective responses to the latest threats. Organizations signed up to the HITRUST Cyber Threat Xchange receive indicators of threats and compromise rapidly, as was highlighted by the recent WannaCry ransomware attacks. HITRUST reports that it was providing detailed information on the threat two weeks before the first...

Read More
Mid-Year Healthcare Data Breach Report Shows Insiders Pose the Biggest Data Breach Risk
Aug03

Mid-Year Healthcare Data Breach Report Shows Insiders Pose the Biggest Data Breach Risk

Protenus has released its mid-year healthcare data breach report. The Breach Barometer reports chart the data breaches experienced by healthcare organizations each month and include data from the Office for Civil Rights and other verified sources. The mid-year data breach report is a summary of all breaches reported between January and June 2017. The mid-year healthcare data breach report shows that while the number of data breaches being reported has remained fairly constant year over year, the number of individuals impacted by healthcare breaches has increased. 223 incidents were reported between January and June. Last year, 450 incidents were reported between January and December. This year looks set to be just as bad, if not worse, than 2016. The mid-year healthcare data breach...

Read More
47% of Healthcare Orgs Have Had a HIPAA Data Breach in the Past 24 Months
Aug01

47% of Healthcare Orgs Have Had a HIPAA Data Breach in the Past 24 Months

A recent survey conducted by KMPG has revealed that 47% of healthcare organizations have experienced a HIPAA data breach in the past 24 months. The last time the KPMG Cyber Healthcare and Life Sciences Survey was conducted in 2015, 37% of respondents confirmed they had experienced a data breach over the same time period. 70% of respondents said they had experienced at least one security breach due to an unplugged vulnerability being exploited by a malicious actor. 54% said they had experienced a malware incident, while 36% said at least one of their employees had responded to a phishing email resulting in the exposure of sensitive data. Third-party companies or devices were implicated in breaches at 26% of organizations while one fifth of respondents said a breach had been caused by an...

Read More
Data Breach Reporting Tool Updated by OCR
Jul25

Data Breach Reporting Tool Updated by OCR

Following the passing of the HITECH Act in 2009, the Department of Health and Human Services’ Office for Civil Rights developed its data breach reporting tool to allow HIPAA-covered entities to easily submit reports of data breaches. A summary of data breach reports is published via the data breach reporting tool and is viewable by the public. The data breach list – which is commonly known as OCR’s Wall of Shame – details all reported healthcare data breaches that impact more than 500 individuals. While there have been updates to the data breach reporting tool since its release, the format of the data breach list has changed little over the years. An update to the portal, and how the information is displayed, was long overdue. Recently there have been calls for OCR to change the...

Read More
Model Patient Request for Health Information Form Issued by AHIMA
Jul25

Model Patient Request for Health Information Form Issued by AHIMA

A model patient request for health information form has been issued by the American Health Information Management Association (AHIMA) that can be used by healthcare providers to give to patients who request copies of their health information. The HIPAA Privacy Rule permits patients to obtain copies of their health data from their providers, although at many hospitals the process is inefficient, lacks transparency and patients are often left in the dark about what is happening after they have submitted their requests, according to a recent report from the ONC. Under HIPAA Rules, patients must be provided with copies of their health information within 30 days of the request being submitted. Patients are also permitted to request their information in paper or electronic form, although ONC...

Read More
Does GDPR Apply to US Companies?
Jul24

Does GDPR Apply to US Companies?

The General Data Protection Regulation (GDPR) comes into effect in the EU in May 2018, but does GDPR apply to US companies, and if so, how?   What is the General Data Protection Regulation (GDPR)? The General Data Protection Regulation is a new law in the European Union that was approved by the EU Parliament on April 14, 2016. GDPR – Regulation (EU) 2016/679 – will come into effect on May 25, 2018 – the deadline for ensuring compliance with GDPR. GDPR will replace existing privacy legislation (Data Protection Directive 95/46/EC) that was introduced in 1995, updating the requirements for companies and individuals doing business in the EU with respect to data security and privacy. As the name suggests, GDPR is concerned with the protection of personal data collected from consumers....

Read More
Call Issued for Federal Agencies to Adopt DMARC to Prevent Phishing
Jul20

Call Issued for Federal Agencies to Adopt DMARC to Prevent Phishing

Over the past few months there have been several cases of criminals impersonating government departments in phishing campaigns, prompting Sen. Ron Wyden (D-OR) to write to the Department of Homeland Security calling for the use of DMARC to prevent phishing attacks using federal email domains. Phishers are gaining access to real domains used by federal agencies and are sending out phishing emails. The official domains add authenticity to the phishing attacks, increasingly the likelihood that email recipients will open the emails and take whatever action the attackers suggest. DMARC can be used to prevent spoofing of domains. DMARC uses two validation systems: Domain Keys Identified Mail and the Sender Policy Framework to verify the sender of the email and determine if the domain is being...

Read More
Ransomware Investigation Uncovered 15-Month Data Breach
Jul20

Ransomware Investigation Uncovered 15-Month Data Breach

When Peachtree Neurological Clinic was attacked with ransomware all was not lost as data were recoverable from backups; however, the ransomware investigation revealed something far worse. Its systems had been breached 15 months previously. The ransomware incident resulted in the encryption of the provider’s electronic medical records. A ransom demand was issued. Payment was required in exchange for the keys to unlock the encryption. Since Peachtree Neurological Clinic had a backup up its data, it was not necessary to pay the ransom. The encrypted files could be restored. A forensic investigation was conducted to determine whether all traces of the ransomware had been removed. Peachtree Neurological Clinic conducted various scans of its system to determine whether the ransomware had been...

Read More
HHS Announces Closing Out of Office of the Chief Privacy Officer
Jul17

HHS Announces Closing Out of Office of the Chief Privacy Officer

The Department of Health and Human Services’ Office of the National Coordinator for Health Information Technology (ONC) will be closing out the Office of the Chief Privacy Officer in FY 2018 due to cuts to its budget. The budget cuts are intended to make the ONC more accountable and a much leaner organization. The ONC will have to operate with $22 million less funding in FY 2018, and the Office of the Chief Privacy Officer is one of the early casualties. The HITECH Act in 2009 required the HHS to appoint a Chief Privacy Officer, whose main role is to advise the National Coordinator on privacy and security polices, in addition to coordinating with other federal agencies, regions and states. The CPR has also played a significant role in outreach efforts to improve understanding of HIPAA...

Read More
UK Hospital Cybersecurity Funding to Increase by £21 Million
Jul16

UK Hospital Cybersecurity Funding to Increase by £21 Million

Hospital cybersecurity funding has been increased in the UK in the wake of the recent WannaCry ransomware attacks that crippled parts of the NHS. Health Secretary Jeremy Hunt has pledged a further £21 million ($27 million) will be made available to 27 major trauma centers in the UK to improve their cybersecurity protections. The additional hospital cybersecurity funding is intended to make it harder for hospitals to be attacked with malware. The WannaCry ransomware attacks on May 12, 2017 affected 48 NHS trusts in the UK and prevented medical services from being provided to some patients. Hospital systems were taken out of action and it took several days for systems to be brought back online. Attacks on that scale should not have been possible and should not have had such a major impact...

Read More
Global Petya Ransomware Attacks involve Modified EternalBlue Exploit
Jun28

Global Petya Ransomware Attacks involve Modified EternalBlue Exploit

Global Petya ransomware attacks are underway with the campaign bearing similar hallmarks to the WannaCry ransomware attacks in May. The attackers are using the a modified EternalBlue exploit that takes advantage of the same SMBv1 vulnerability used in WannaCry. The ransomware variant bears a number of similarities to Petya ransomware, although this appears to be a new variant. Petya ransomware was first discovered last year, with the latest variant using a similar encryption process. In contrast to WannaCry, Locky and CryptXXX, this ransomware variant does not encrypt files. Instead, it encrypts the master file table (MFT) which is what computer use to locate files on hard disks. Without the MFT, the computer cannot locate files. Stored files are not encrypted but they still cannot be...

Read More
$115 Million Anthem Data Breach Settlement Agreed
Jun27

$115 Million Anthem Data Breach Settlement Agreed

A $115 million Anthem data breach settlement has been agreed in the consolidated data breach case filed on behalf of the 78.8 million victims of the firm’s 2015 data breach. If the Anthem data breach settlement is approved by the judge presiding over the case it will be a record-breaker – The largest data breach settlement ever reached. That said, the amount each victim will receive will be low. Lawyers will take one third of the settlement, leaving little for the data breach victims. The Anthem data breach settlement may be a record-breaker, but take out the lawyers’ fees and it only amounts to around one dollar per breach victim, although not all victims are members of the class-action. Once lawyers’ fees have been taken out of the Anthem data breach settlement, the remainder will...

Read More
Healthcare Data Breach Resolution Costs Fall
Jun26

Healthcare Data Breach Resolution Costs Fall

Healthcare data breach resolution costs are still higher than all other industries, but the latest Ponemon Institute/IBM Security study has shown that for the first time ever, those costs have fallen year-over-year. For seven years, Ponemon/IBM have been conducting their cost of a data breach study, and each year the costs of resolving data breaches has risen. However, this year, average breach resolution costs fell by around 10%. The average cost of a data breach is now $3.62 million globally with the average per record cost being $141. Heavily regulated industries such as the financial services and healthcare face higher breach costs, with healthcare topping the list for seven consecutive years. Healthcare data breach resolution costs are now $380 per exposed or stolen record. The...

Read More
PhishMe Lands Prestigious 2017 SC Europe Award for its Anti-Phishing Solutions
Jun14

PhishMe Lands Prestigious 2017 SC Europe Award for its Anti-Phishing Solutions

Each year, SC Media hosts a prestigious awards ceremony where the best companies and information security products are recognized and celebrated. The SC Awards are widely regarded as some of the most prestigious awards for companies in the field of information security. Each company and product is scrutinized by two panels of judges which score the companies and products on a wide range of criteria. To be selected as a finalist in one of the 29 categories shows a company can truly claim to be one of the best of the best. Being named as a category winner is a tremendous honor. The awards are highly coveted and clearly show companies have gone the extra mile and developed a truly outstanding product. This year, the human phishing defense solution provider PhishMe was nominated as a...

Read More
Q2 Saw a 400% Increase in Phishing Attacks on Businesses
Jun13

Q2 Saw a 400% Increase in Phishing Attacks on Businesses

The threat from phishing has been growing steadily over the past few years, but a new report from Mimecast shows the threat is greater than ever before with more phishing attacks on businesses than any other time in history. The report shows there has been a 400% increase in phishing attacks on businesses in Q2, 2017. For the study, Mimecast analyzed the inbound emails of 44,000 business users. That analysis showed cybercriminals are increasingly targeting employees using highly sophisticated methods to get them to reveal their login credentials or install malware. It is now increasingly common for threat actors to impersonate C-level executives, business partners or employees to add more authenticity to their requests. When an email appears to have been sent by a c-level executive, many...

Read More
Phishing Trends and Intelligence Report Published by PhishLabs
Jun12

Phishing Trends and Intelligence Report Published by PhishLabs

PhishLabs, a leading provider of phishing defense solutions, has published its Phishing Trends and Intelligence Report for Q1, 2017. The report shows that cybercriminals have changing tactics and targets in the first quarter of 2017, attacking different industries with different methods compared to the previous quarter. PhishLabs CEO Tony Price said, “The first quarter of 2017 shows just how quickly the phishing threat landscape can change as threat actors shift who they target and how.” While the healthcare sector has been a major target in 2016, in Q1, 2017 the majority of phishing attacks were conducted on five other industry sectors. PhishLabs reports that 88% of phishing attacks were conducted on financial institutions, e-commerce companies, cloud storage/file hosting...

Read More
PhishMe Offers Assistance with GDPR Compliance
Jun10

PhishMe Offers Assistance with GDPR Compliance

The General Data Protection Regulation (GDPR) will be written into EU law next year, although companies need to start their GDPR compliance programs now if they are to ensure they are fully compliant before the May 25, 2018 deadline. Any company that is discovered not to be in compliance with the new regulation after that date faces a stiff financial penalty. The maximum fine for non-compliance with GDPR is $20 million Euros or 4% of the company’s global annual turnover, whichever is the greater. GDPR compliance is not optional. Any company doing business in any of the 28 EU member states is required to comply with the new regulation. The main aim of GDPR is to strengthen data protection rights of individuals and facilitate the free flow of personal data in the digital single market....

Read More
Pacemaker Cybersecurity Protections Found Lacking
Jun01

Pacemaker Cybersecurity Protections Found Lacking

A recent study has found pacemaker cybersecurity protections not only to be lacking, but woefully inadequate. Many of the devices tested were discovered to contain thousands of software vulnerabilities, many of which could potentially be exploited by cybercriminals to gain access to the devices and their associated systems. Medical device security issues have long been a concern, yet little is being done to address the problems. In some cases, the security vulnerabilities are severe and could easily result in the exposure or theft of sensitive data. Worse, vulnerabilities could be exploited to cause the devices to malfunction, which has potential to cause patients to come to serious harm. Last year, MedSec conducted a study of pacemakers and associated devices manufactured by St. Jude...

Read More
New Ironscales Report Delves into Current Phishing Trends
May30

New Ironscales Report Delves into Current Phishing Trends

Ironscales, a leading vendor of anti-phishing solutions, has published a new report on the latest phishing trends. The report shows how phishing tactics have changed, the effectiveness of phishing campaigns and how traditional anti-spam technologies are failing to block spear phishing attacks. The report – titled ‘How Modern Email Phishing Attacks Have Organizations on the Hook’ – was the result of a study of 8,500 verified phishing attacks on 100 organizations affecting 500,000 mailboxes. Those organizations were spread across many industry sectors including healthcare, finance, energy and Insurance in North America, Europe, Africa and the Middle East. Phishing emails used to be fairly easy to identify and block; however, the tactics used by cybercriminals today result in more...

Read More
Windows 7 Computers Worse Hit by WannaCry Ransomware
May23

Windows 7 Computers Worse Hit by WannaCry Ransomware

The WannaCry ransomware attacks are understood to have resulted in data being encrypted on around 300,000 computers in 150 countries. The attackers took advantage of unpatched software, exploiting a vulnerability in Microsoft Server Message Block 1.0 (SMBv1) using the EternalBlue exploit stolen from the NSA and published online by the hacking group Shadow Brokers. While a patch had been released by Microsoft to fix the vulnerability in March (MS17-010), many organizations had been slow to apply the patch and were vulnerable to attack. However, the bulk of infected computers were running older operating systems for which a patch had not been released. Data released from Kaspersky Lab shows that in the vast majority of cases, it was organizations with Windows 7 machines that had data...

Read More
Wanna Decryptor Ransomware Encrypts Data on Medical Devices
May18

Wanna Decryptor Ransomware Encrypts Data on Medical Devices

Friday’s Wanna Decryptor ransomware campaign badly affected NHS hospitals in the United Kingdom, with 40 hospitals spread across at least 24 Trusts confirming they were affected and had data encrypted. However, some media reports claim as many as 48 of the 248 Trusts in the UK were impacted by the attack to some degree. Wanna Decryptor (WannaCry/WannaCrypt) attacks rapidly spread across the globe, with an estimated 200,000 victims spread across 150 countries. China was hit particularly badly due to the number of computers running older, vulnerable operating systems such as Windows XP. Microsoft had issued a patch to address the vulnerability that was exploited by Wanna Decryptor ransomware, although not for the unsupported Windows XP operating system. Microsoft has since taken an unusual...

Read More
WannaCry Ransomware Campaign Thwarted
May15

WannaCry Ransomware Campaign Thwarted

The WannaCry ransomware campaign that saw 61 NHS Trusts in the UK attacked has been stopped thanks to the actions of a UK security blogger and malware researcher. The individual, who wishes to remain anonymous, found a kill switch for the ransomware that prevented it from encrypting files. The WannaCry ransomware campaign was launched on Friday May 12, 2017, with infections occurring at lightning speed. In contrast to many ransomware campaigns that are highly targeted on specific industries or geographical locations, this attack was global. It soon became apparent that the WannaCry ransomware campaign was one of the largest ever conducted. On Saturday, there were 57,000 known infections in 100 countries. This morning, as the dust started to settle, the victim count has soared to more...

Read More
NIST Small Business Cybersecurity Act of 2017 Approved by House Committee
May08

NIST Small Business Cybersecurity Act of 2017 Approved by House Committee

The NIST Small Business Cybersecurity Act of 2017 has been approved by the U.S. House Committee on Science, Space, and Technology. The new act requires the National Institute for Standards and Technology to issue new cybersecurity guidance for small businesses to help them manage cybersecurity risk. Cyberattacks on small businesses are now commonplace with cybercriminals often targeting small businesses. Smaller businesses may not have as much data as large organizations, so cyberattacks are less profitable; however, small businesses also have weaker defenses making attacks far easier. Further, if access is gained to the computer systems of small businesses, cybercriminals may be able to use that access to launch attacks on suppliers and vendors. Small healthcare organizations in...

Read More
Webroot Antivirus Update Problems Mount: Servers, PCs and Apps Crippled
Apr25

Webroot Antivirus Update Problems Mount: Servers, PCs and Apps Crippled

Webroot antivirus update problems are mounting with many thousands of the company’s customers experiencing severe issues after installing an April 24 update. Customers who had their computers running between 7PM and 9PM UTC on April 24 and had their AV set to update automatically had the update applied. While the update should have simply loaded the latest malware signatures, hundreds of critical files were accidentally marked as malicious. The AV solution then started moving those files to the quarantine folder, causing servers and PCs to become unstable and crash. The reason for the crashes and system instability was due to Windows system files being mistakenly marked as infected with W32.Trojan.Gen. However, the Webroot antivirus update problems didn’t end there. In addition to system...

Read More
Employee Security Awareness is the Biggest Healthcare Data Security Threat
Apr20

Employee Security Awareness is the Biggest Healthcare Data Security Threat

Hackers continue to target healthcare organizations, malware is a constant threat, and ransomware continues to pose many problems, but when it comes to the biggest healthcare data security threats, employee security awareness has topped the table. HIMSS Analytics recently asked 125 healthcare IT leaders and IT professionals about their biggest concerns, and top spot when it came to data security threats was a lack of employee security awareness. However, it does not appear that employees have not been told about risks and best practices. 85% of respondents said they did provide security awareness training to employees, yet almost 80% of respondents still said employee security awareness was their top concern. The survey suggests that while employee security awareness training is...

Read More
March Sees Increase in Healthcare Data Breaches and Victim Count
Apr18

March Sees Increase in Healthcare Data Breaches and Victim Count

This year has seen healthcare data breaches remain steady for the first couple of months, although March saw the number of incidents rise and the severity of those incidents also increase. In January and February, 31 incidents occurred each month. In March, there were 39 reported incidents, according to the latest Breach Barometer healthcare data breach report from Protenus. The number of records exposed or stolen in those attacks increased sharply, with more than two and a half times as many individuals impacted by data breaches in March than were affected by the healthcare data breaches in January and February combined. There was one massive data breach reported that affected 697,000 patients. That incident involved the theft of a device containing electronic protected health...

Read More
Companies Wasting Money on Unused Cloud Capacity
Apr13

Companies Wasting Money on Unused Cloud Capacity

There are many benefits to switching to cloud computing, although one of the most important reasons for switching to the cloud is to save money. The cloud allows companies to avoid paying for expensive on-premise hardware. Purchasing servers requires a high capital expenditure, which can be avoided by using the cloud. More hardware also needs to be purchased than is actually necessary to make sure there is sufficient capacity to cope with the peaks, and also as backup for hardware failure. With cloud computing, the hardware cost is the service provider’s problem. Savings can also be made on staffing. Without the need to maintain equipment, fewer man hours are required and IT employees’ time does not come cheap. There are also savings to be made on power. Running IT equipment requires...

Read More
Philadelphia Ransomware Used in Targeted Attacks on US Hospitals
Apr11

Philadelphia Ransomware Used in Targeted Attacks on US Hospitals

Cybercriminals are conducting targeted attacks on U.S. healthcare organizations using Philadelphia ransomware; a relatively new ransomware variant developed from Stampedo ransomware. Philadelphia ransomware was first seen in September 2016, although recently, a new campaign has been detected that has already seen two U.S hospitals have sensitive files encrypted. The actors behind the latest attacks are targeting physicians using spear phishing emails. Information about targets can be easily found on social media accounts with a little research. Information is gathered on an organization and campaigns crafted to maximize the chance of infection. In this case, the attackers use logos and names of physicians who work at the targeted hospital to add credibility to documents and increase the...

Read More
Study Analyses Hospital Data Breach Risk
Apr06

Study Analyses Hospital Data Breach Risk

A recent study published in JAMA Internal Medicine looked at the hospital data breach risk and determined which organizations are most at risk of experiencing data breaches. The researchers discovered that hospital data breach risk is positively linked with the size of the hospital. Larger hospitals are more likely to experience data breaches, as are hospitals with a strong focus on teaching. Smaller hospitals may have smaller budgets to devote to cybersecurity and may not be such large targets for cybercriminals; however, the researchers determined that hospital data breach risk is higher at larger and teaching-focused hospitals due to them providing greater access to healthcare data. The more individuals that require access, the higher the risk of data breaches being suffered. For the...

Read More
74% of Organizations Vulnerable to Insider Threats
Apr04

74% of Organizations Vulnerable to Insider Threats

Spending on cybersecurity defenses has increased to reduce the risk of attacks by cybercriminals, yet organizations still feel vulnerable to insider threats. Furthermore, insider threats have increased in the past 12 months, according to a recent survey conducted on U.S. IT security professionals. 508 IT security professionals were surveyed by LinkedIn’s Information Security Community and Crowd Research Partners in a study conducted for Haystax Technologies. The study revealed that 74% of IT security pros feel their organization is vulnerable to attacks by insiders. That represents a 7% increase in the perceived threat level in the space of a year. More than half of surveyed IT security professionals also said the number of insider threats had increased in the past 12 months. 56% said...

Read More
Cybersecurity Tips for Healthcare Providers Offered by WEDI
Mar24

Cybersecurity Tips for Healthcare Providers Offered by WEDI

The Workgroup for Electronic Data Interchange (WEDI) has published a white paper offering cybersecurity tips for healthcare providers to help them ensure the sensitive protected health information of patients remains confidential and resilience against healthcare cyberattacks is improved. The white paper – The Rampant Growth of Cybercrime – explains the scale of the current problem. The healthcare industry has been extensively targeted by cybercriminals over the past few years and the attacks are showing no sign of abating. The sheer number of data security incidents reported to the Department of Health and Human Services’ Office for Civil Rights shows just how frequently cyberattacks result in access to ePHI being gained. In 2016, more than 315 major data security breaches were reported...

Read More
Medical Records of 26 Million Healthcare Patients at Risk of Compromise
Mar21

Medical Records of 26 Million Healthcare Patients at Risk of Compromise

An IT system used by around 2,700 medical practices in the United Kingdom potentially allows the medical records of patients to be accessed by unauthorized individuals. The system –  SystmOne – is one of the most popular in the United Kingdom and contains the medical records of around 26 million UK patients. While the system is secure, if practices activate ‘enhanced data sharing’ the records contained in the system can be made available to local hospitals. However, that setting would also enable hundreds of thousands of healthcare workers to also access patients’ medical records. Those employees include receptionists and clerical staff, who are unauthorized to view the records. Members of staff in prisons, pharmacies, GP surgeries and care homes could also potentially be given...

Read More
Dharma Ransomware Decryptor Developed
Mar02

Dharma Ransomware Decryptor Developed

Following the release of decryption keys this Wednesday, security researchers have developed a free Dharma ransomware decryptor. It is now possible for businesses and individuals who have had their files encrypted by Dharma ransomware to unlock their files without having to pay a ransom. Dharma ransomware has not been one of the most prevalent ransomware threats. There have been nowhere near as many infections as the likes of CryptXXX, Locky, or Samsa ransomware. Those ransomware variants, along with hundreds of others, are still being used to attack businesses and individuals and no free decryptors are yet available for those infections. Dharma ransomware first appeared in November 2016, having been developed from Crysis ransomware. The decryption keys for Crysis were also released...

Read More
Trust in Healthcare Providers High, Despite Increased Data Breaches
Feb24

Trust in Healthcare Providers High, Despite Increased Data Breaches

Trust in healthcare providers’ ability to keep the sensitive data of patients and health plan members secure remains high, even though the past two years have seen record numbers of healthcare data breaches reported. In 2015, more than 113 million healthcare records were exposed or stolen, and 2016 saw more healthcare data breaches discovered than in any other year since records first started being kept. According to a recent survey by Accenture, 88% of Americans trust their healthcare providers to keep their health information secure. 36% of respondents said they had a great deal of trust in their healthcare providers and believed they could prevent their health data from being accessed or stolen. Trust in pharmacies was similarly high, with 85% of respondents believing data would not...

Read More
Ironscales Wins Best Messaging Security Solution Award
Feb15

Ironscales Wins Best Messaging Security Solution Award

Cyber Defense Magazine has announced the winners of its 2017 Awards, with Ironscales winning an Editor’s Choice Award in the Best Messaging Security Solution category for its automated phishing defense platform IronTraps™. The Cyber Defense Magazine Awards are decided by a panel of independent information security experts, with nominated products assessed on a wide range of criteria over a period on months. The prestigious awards recognize innovative cybersecurity products that are highly effective at blocking cyber threats. Pierluigi Paganini, Editor-in-Chief of Cyber Defense Magazine, said “We’re thrilled to recognize next-generation innovation in the information security marketplace and that’s why Ironscales has earned this award from Cyber Defense Magazine. IronTraps™ is the first,...

Read More
Maryland Ransomware Bill Makes Attacks Felonies
Feb15

Maryland Ransomware Bill Makes Attacks Felonies

A new Maryland ransomware bill has been introduced that makes extortion using unauthorized software a criminal offense. The new Maryland ransomware bill introduces stiff penalties for ransomware attacks on companies based in the state as well as attacks on individuals. Cybercriminals that use ransomware to try to extort money from victims would be fined up to $10,000 for the attack and could face up to 10 years in jail. While the Maryland ransomware bill – HB 340 – may be enough to discourage home-grown attacks, it is likely to do little to deter foreign cybercriminals. Since the majority of ransomware attacks are launched from outside the United States, state residents should not let down their guard. The bill points this out quite clearly saying “Because the perpetrators are often...

Read More
February Patch Tuesday Delayed as Microsoft Fixes Last Minute Issues
Feb15

February Patch Tuesday Delayed as Microsoft Fixes Last Minute Issues

The Valentine’s Day update from Microsoft did not arrive yesterday as planned. February Patch Tuesday will be coming, just a little later than usual. The decision to bundle together updates means that if urgent flaws are not fixed in time, they would have to wait until the following month to be fixed. In this case, Microsoft has chosen to delay its monthly round of patches to make sure some serious issues are addressed and included in this month’s round of patches. IT admins have been waiting for Microsoft to issue its update to address a flaw that was identified three months ago and was announced earlier this month. Microsoft delayed issuing a patch for the zero-day flaw in the SMB file sharing platform until Patch Tuesday, even though the flaw is being exploited in the wild. While the...

Read More
Windows Devices Used to Increase Size of Mirai Botnet
Feb14

Windows Devices Used to Increase Size of Mirai Botnet

The Mirai Botnet was used to launch devastating distributed denial of service (DDoS) attacks late last year, some of which took down large sections of the Internet including some of the most popular websites  – Twitter and Netflix for example. One Mirai attack on the hosting company OVH registered 1.1 Tbps. It has been predicted that attacks on that scale are likely to become much more common in 2017. The Botnet is comprised of IoT devices that have been poorly protected. Mirai malware is loaded to those devices to create an army capable of conducting massive DDoS attacks. Mirai targets Linux-based IoT devices such as DVRs, surveillance cameras, IP cameras and routers, rather than computers. While the botnet is not believed to include Windows devices, they are now being used to...

Read More
Healthcare Data Breach Report for January 2017 Highlights Insider Risk
Feb14

Healthcare Data Breach Report for January 2017 Highlights Insider Risk

The healthcare data breach report for January 2017 published by Protenus this week highlights the danger of insider data breaches. Insider data breaches accounted for the largest percentage of healthcare data breaches disclosed in January 2017, considerably more than those caused by hackers. Summary of the Protenus Healthcare Data Breach Report for January 2017 In January 2017, 31 healthcare data breaches were disclosed publicly. While the causes for all of those breaches are not yet known – details of 26 breaches have yet to be disclosed – 58.4% were due to insiders. Those breaches accounted for 59.2% of the 388,307 records known to have been exposed in those 31 healthcare data breaches in January 2017. The insider threat is perhaps the hardest to mitigate, yet the risk posed by...

Read More
New Microsoft Security Tools for Businesses Soon to be Released
Feb13

New Microsoft Security Tools for Businesses Soon to be Released

On Friday, an announcement was made about a host of new Microsoft security tools for businesses that will soon be released. The new tools have a wide range of cybersecurity capabilities and can be used by businesses to improve security on Windows 10 and Office 365. Businesses will soon be able to use on-premises Active Directory with Windows Hello which will allow the use of biometric logins to improve authentication without the need to use Azure Active Directory. A Dynamic Lock feature will also be added in Windows Hello. This feature will link a smartphone with Windows 10 to ensure that Windows 10 devices are locked when they are out of Bluetooth range, helping to prevent unauthorized access when users forget to lock their devices when they leave their desks. The tools will be released...

Read More
HITRUST Threat Catalogue Helps Healthcare Industry Prioritize Cybersecurity Threats
Feb10

HITRUST Threat Catalogue Helps Healthcare Industry Prioritize Cybersecurity Threats

The HITRUST Alliance has announced that the organization will be releasing the HITRUST Threat Catalogue in March: A new resource to help healthcare organizations improve security by aligning the wide range of current cybersecurity threats and risk factors with its Common Security Framework. The Health Insurance Portability and Accountability Act (HIPAA) requires all covered entities to conduct a risk assessment to identify the potential threats to the confidentiality, integrity, and availability of electronic protected health information. The risk assessment is a fundamental element of HIPAA and healthcare data security. If a risk assessment is not performed, a healthcare organization will be unaware of the risks to ePHI and will therefore not be able to take appropriate action to reduce...

Read More
Phishing Attacks on Cloud Storage Providers Causing Concern
Feb09

Phishing Attacks on Cloud Storage Providers Causing Concern

Phishing is one of the most common ways that cybercriminals gain access to sensitive data. While logins for online banking services are still a major prize, cybercriminals are now increasingly conducting phishing attacks on cloud storage providers. Software-as-a-service (SaaS) attacks have also soared. A recent report from PhishLabs shows the extent to which cloud storage providers are being targeted. In 2013, cloud storage and hosting services accounted for 9% of attacks. By 2016, the percentage had risen to 23% of attacks. Attacks on SaaS providers barely registered in 2013. Now attacks account for 2% of the overall total. In 2016, phishing attacks on cloud storage providers increased by 5%, while attacks on SaaS providers increased by a staggering 182%. According to PhishLabs, the...

Read More
Beware of LNK Attachments and Malicious SVG Files
Feb08

Beware of LNK Attachments and Malicious SVG Files

JavaScript attachments are still used to infect computers with malware and ransomware, but a new trend has emerged that is seeing cybercriminals switch to malicious SVG files. Malicious LNK files are also growing in popularity. The reasoning behind the switch in file types is clear. They are much less likely to arouse suspicion; therefore, they are more likely to be opened. JavaScript has been extensively used over the past 12 months as a malware downloader. Malicious email attachments containing JavaScript code – or JavaScript files – have been highly effective. However, for most computer users, JavaScript files are rarely encountered. A zip file may be extracted if the email recipient is made to believe that the file is benign, but many individuals would think twice about double...

Read More
IRS Issues W2 Phishing Scam Warning
Feb07

IRS Issues W2 Phishing Scam Warning

Cybercriminals have been sending huge numbers of W2 phishing scam emails over the past few weeks. Tax season usually sees an increase in scam emails being sent, although this year cybercriminals have started their scamming campaigns even earlier. The victim count is also growing rapidly. The W2 phishing scam in question is an email request for copies of employees’ W-2 forms. The scammers impersonate the CEO, CFO or another executive in the organization that is likely to have a legitimate need for the data. Cybercriminals are using a variety of techniques to spoof company email addresses. A casual glance at the email address of the sender will not reveal any clues that the email is not genuine. Since the email appears to have been sent from an authority figure, employees are less likely...

Read More
Reputation Loss of More Concern than a Data Breach
Feb06

Reputation Loss of More Concern than a Data Breach

Data breaches are a constant worry for most organizations, although a new study from the Ponemon Institute has shown that while the theft of data is a concern, it is the fallout from poor risk management that is the biggest worry. The biggest fear is not loss of data but loss of reputation. The study, which was sponsored by RiskVision, was conducted on 641 professionals involved in risk management at their respective organizations. When asked about their biggest fears from poor risk management, 63% said reputation damage. Security breaches only ranked in second place along with business disruption, jointly cited as a major concern by 51% of respondents. Damage to a brand is almost certain to happen after a data breach is experienced or intellectual property is stolen. While it is usually...

Read More
Spam Email Volume has Increased: 65% of Emails are Spam
Feb02

Spam Email Volume has Increased: 65% of Emails are Spam

Cisco Systems has released its annual Cybersecurity Report which shows that spam email volume has increased once again. 65% of all emails sent are now spam, and Cisco reports that one fifth of those emails are malicious and contain malware-infected attachments or links to websites containing exploit kits and adware. The report shows there was a massive spike in spam email volume in 2016, with many of those emails sent using the Necurs botnet. The Necurs botnet grew by around 200,000 IP addresses in June over just a couple of hours, and the botnet has continued to grow throughout the year. In addition to a spike in spam email, the Necurs botnet is also extensively used to spread malware such as the Dridex Trojan and ransomware variants including Locky. There has been a marked change in...

Read More
WebEx Browser Extension Flaw Patched by Cisco Systems
Jan31

WebEx Browser Extension Flaw Patched by Cisco Systems

A WebEx browser extension flaw discovered by Google’s Tavis Ormandy has now been patched by Cisco Systems. The critical vulnerability affects the Cisco WebEx Meetings Server and Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center) browser extensions on Windows machines. Affected versions of the extension are the Cisco WebEx Extension for Google Chrome (earlier versions than 1.0.7), the ActiveTouch General Plugin Container on Firefox (earlier versions than 106), and the IE GpcContainer Class ActiveX control file. (earlier versions than 10031.6.2017.0126) The vulnerability in the web conferencing software could potentially be exploited by hackers allowing the remote execution of malicious code. According to Cisco, the WebEx browser extension flaw is due...

Read More
Beazley Report Details Biggest Security Threats in 2016
Jan31

Beazley Report Details Biggest Security Threats in 2016

Beazley, a provider of cybersecurity insurance for businesses, has released a new report detailing the biggest security threats in 2016. For the report, Beazley analyzed almost 2,000 data breaches experienced by its clients in 2016. The report shows the extent to which ransomware was used to attack U.S. businesses last year. Ransomware attacks on businesses in the United States increased fourfold in 2016. In 2016, Beazley’s clients experienced more than 200 ransomware attacks. According to Beazley’s calculations, we can expect ransomware attacks to continue to increase in 2017. Attacks on businesses are easy to pull off because cybersecurity defenses are not sufficiently advanced to cope with increasingly sophisticated ransomware variants. Beazley predicts ransomware attacks will double...

Read More
Increased Security Spending Does Not Equate to Better Cybersecurity Defenses
Jan30

Increased Security Spending Does Not Equate to Better Cybersecurity Defenses

Increasing spending on cybersecurity solutions will not necessarily mean organizations are better equipped to deal with cyber threats. While many organizations choose to increase spending on defenses to counter the increased threat, it is essential that the money is spent on solutions that are able to keep sensitive data secured. There is a tendency to keep on investing in similar technologies, even though they have been shown to be ineffective at mitigating risk. A survey conducted by 451 Research for the Thales 2017 Data Threat Report indicated 73% of organizations had increased security spending for 2017. In 2016, security spending had been increased by 58% of organizations surveyed. While it is reassuring that organizations appreciate defenses need to be improved, an analysis of...

Read More
Gmail to Start Blocking JavaScript Attachments from February 2017
Jan27

Gmail to Start Blocking JavaScript Attachments from February 2017

Blocking JavaScript attachments can help to reduce malware and ransomware infections, yet Google has resisted adding the file attachments to its banned list. However, that will now change from February 13, 2017. JavaScript files – those with extensions .JS and .JSE – are now commonly used by cybercriminals to infect computers with malware. Over the course of the past two years, malicious JavaScript files has been one of the preferred methods of infecting computers with ransomware. JavaScript files are commonly used as downloaders for malware, and ransomware in particular. The files are usually hidden using a variety of techniques, such as the use of double extensions such as PDF or DOCX to fool email recipients into thinking the files are genuine invoices or parcel tracking documents....

Read More
Kroll Publishes Global Fraud and Risk Report for 2016/2017
Jan27

Kroll Publishes Global Fraud and Risk Report for 2016/2017

The 2016/2017 Kroll Annual Global Fraud and Risk Report has just been released, highlighting just how frequently cybersecurity incidents are experienced by businesses. According to Kroll’s Global Fraud and Risk Report, 85% of surveyed company executives have experienced a cybersecurity incident in the past 12 months. 68% reported at least one security incident, while 82% of executives said their company had experienced at least one instance of fraud. Out of the companies that had been attacked, 33% said they have experienced virus or worm infections and 26% of respondents said their employees had been targeted with phishing attacks. Data deletion or loss due to system issues was reported by 24% of executives, 23% had experienced a data breach involving employee or customer data, and 22%...

Read More
Over 220 Trend Micro Security Vulnerabilities Discovered in 6 Months
Jan27

Over 220 Trend Micro Security Vulnerabilities Discovered in 6 Months

Two security researchers have discovered more than 220 Trend Micro security vulnerabilities in the past 6 months. 194 of those vulnerabilities were rated as critical and could potentially allow hackers to remotely execute code without any need for user interaction. The vulnerabilities are spread across 11 different products produced by the cybersecurity firm, and one of those vulnerabilities, which affects Trend Micro’s Data Loss Prevention, could potentially allow hackers to compromise an entire network. In total, Roberto Liverani and Steven Seeley have passed on details of 223 Trend Micro security vulnerabilities to the company since July 29, 2016. A statement released by Trend Micro confirmed that the company takes all security vulnerabilities seriously, saying “we are dedicated to...

Read More
Worst Passwords of 2016 Revealed
Jan24

Worst Passwords of 2016 Revealed

The worst passwords of 2016 have been revealed by SplashData. This year’s report shows the same mistakes are still being made by end users. Even though the use of weak passwords is a major security risk, end users are still opting for passwords that are easy to remember and simplicity is often favored over security. To compile the list of the worst passwords of 2016, SplashData researchers trawled through millions of stolen credentials that had been dumped online.  In total, more than 5 million passwords were assessed and sorted to find the most common passwords in use. The results of SplashData’s analysis do not make for pleasant reading. It would certainly not take a hacker to guess many of the passwords on the list. SplashData’s password analysis showed that not only are ridiculously...

Read More
Biomedical Research Labs Targeted with Ancient Mac Malware
Jan20

Biomedical Research Labs Targeted with Ancient Mac Malware

Security researchers have discovered a new Mac malware that is being used in targeted attacks on biomedical research organizations. However, while the malicious code is new to security researchers, it is not a new threat to research organizations. The Mac malware is believed to have been stealing secrets for many years. The malware, named Fruitfly by Apple, was discovered by an IT admin at Malwarebytes. Malwarebytes calls the Mac malware OSX.Backdoor.Quimitchin after the Aztec spies who infiltrated other tribes. Once installed, the malware takes snapshots of the screen and accesses the webcam on infected devices. Furthermore, the malware is able to simulate keyboard and mouse clicks allowing a hacker to take full control the device remotely. The malware also scans the infected device for...

Read More
MAPFRE Life HIPAA Settlement: $2.2 Million for Impermissible Disclosure of ePHI
Jan19

MAPFRE Life HIPAA Settlement: $2.2 Million for Impermissible Disclosure of ePHI

MAPFRE Life Insurance Company of Puerto Rico has settled potential violations of the Health Insurance Portability and Accountability Act (HIPAA) with the Department of Health and Human Services’ Office for Civil Rights. MAPFRE Life HIPAA Settlement of $2.2 Million Agreed with OCR According to the resolution agreement, MAPFRE Life will pay OCR $2,204,182 and must adopt a corrective action plan to address multiple noncompliance issues discovered by OCR during the investigation of a 2011 data breach. On September 29, 2011, MAPFRE discovered that a pen drive had been stolen from its IT department. MAPFRE Life was able to reconstitute the data on the pen drive from the computer to which the drive was attached. An analysis of the data revealed the electronic protected health information of...

Read More
2016 Healthcare Data Breach Report Published
Jan18

2016 Healthcare Data Breach Report Published

The 2016 healthcare data breach report from cybersecurity company Protenus shows that 2016 was a record-breaking year for healthcare data breaches. In 2016, more than one healthcare data breach occurred every day on average. Those breaches resulted in the theft or exposure of 27 million individuals’ confidential information. In total, 450 breach incidents were reported by healthcare organizations – healthcare providers, health plans, healthcare clearinghouses, and business associates of healthcare organizations – in 2016. Hacking incidents and ransomware attacks on healthcare organizations accounted for 26.8% of data breaches according to the 2016 healthcare data breach report. It is difficult to determine how many healthcare ransomware attacks occurred in 2016. The Protenus 2016...

Read More
2017 Global Application and Network Security Report Published by Radware
Jan12

2017 Global Application and Network Security Report Published by Radware

A recent survey conducted by Radware, and published in its 2016-2017 Global Application and Network Security report, shows that almost half of companies have been subjected to a cyber-extortion attempt in 2016, mostly with ransomware. 49% of polled businesses said they had been issued with a ransom demand after a cyberattack in the past 12 month showing the threat of ransom-related attacks has risen considerably. Ransomware and data theft with a ransom charged for its safe return, is a highly profitable strategy for cybercriminals. More actors are now getting involved and are extorting huge sums out of businesses that are not prepared for these types of attacks. The 2016-2017 Global Application and Network Security report confirms what many other surveys and studies have suggested –...

Read More
Attacks on Misconfigured MongoDB Databases Soar
Jan12

Attacks on Misconfigured MongoDB Databases Soar

Over the past two weeks, there has been a spate of attacks on misconfigured MongoDB databases with the attackers wiping data and issuing Bitcoin ransom demands to return the contents of stolen databases. The attacks started on or around December 27, 2016, with one malicious actor believed to have been targeting organizations running unprotected MongoDB databases. By January 6, 2017, that individual had attacked 13 companies. That individual goes by the handle Harak1r1. However, as news spread on the number of unprotected databases that were in use, the attacks started to soar. More individuals have now got in on the act. There are now believed to be between 13 and 15 actors involved in the attacks. In the past few days, the number of companies affected has gone from hundreds to tens of...

Read More
13 Updates Issued by Adobe: 42 Critical Flash, Reader and Acrobat Flaws Addressed
Jan11

13 Updates Issued by Adobe: 42 Critical Flash, Reader and Acrobat Flaws Addressed

The first Patch Tuesday of 2017 has seen Adobe issue 13 updates for Adobe Flash, Adobe Acrobat, and Adobe Reader. The updates address 42 critical vulnerabilities, although exploits are not thought to currently exist in the wild. That said, now the patches have been released, it is only a matter of time before exploits are developed. The updates are spread across two bulletins: APSB17-01 for Acrobat and Reader and APSB17-02 for Adobe Flash Player. 29 critical flaws in Acrobat and Reader have been addressed, all but one of which can lead to remote code execution. The remaining 13 critical vulnerabilities affect Flash. Users of Acrobat XI and Reader XI should update to version 11.0.19, while other users should update to either 15.023.20053 (continuous release track) or 15.006.30279 (classic...

Read More
January 2017 Patch Tuesday: Four Updates Issued by Microsoft
Jan11

January 2017 Patch Tuesday: Four Updates Issued by Microsoft

January 2017 Patch Tuesday sees one of the lightest updates for Microsoft. The updates are spread across just four security bulletins, two of which have been marked as critical. The updates deal with three exploits affecting Microsoft products directly: Microsoft Edge, MS Office and Windows. The fourth update is for Adobe Flash and updates the Edge and IE browsers. The two critical security bulletins are for Microsoft Office and the Adobe Flash. The updates for the Microsoft Edge browser and Windows are marked as important. The Office update affects Microsoft Office Services and Web Apps and addresses a vulnerability that is being tracked as CVE-2017-0003. The vulnerability could allow an attacker to remotely execute code if a user opens a specially crafted MS Office document. The update...

Read More
FDA Confirms Vulnerabilities in St. Jude Medical Devices
Jan10

FDA Confirms Vulnerabilities in St. Jude Medical Devices

The United States Food and Drug Administration (FDA) has completed its investigation into claims that vulnerabilities in St. Jude Medical devices could be remotely exploited by hackers wishing to cause patients harm. Last summer, Muddy Waters published a damming report on ‘stunning’ security vulnerabilities in St. Jude Medical devices that posed a serious risk to patients. The short selling firm had been contacted by a cybersecurity startup called MedSec and was provided with details of a number of alleged security vulnerabilities in St Jude Medical devices, including some of its most popular defibrillators and pacemakers and their associated systems. While the devices are intended to help control patients’ heart functions, the flaws could potentially be exploited by individuals and used...

Read More
$475,000 Presense Healthcare HIPAA Settlement Agreed with OCR
Jan10

$475,000 Presense Healthcare HIPAA Settlement Agreed with OCR

The Department of Health and Human Services’ Office for Civil Rights has announced a $475,000 Presense Healthcare HIPAA settlement has been agreed. This is the first HIPAA enforcement action of 2017 and the first time OCR has settled a case solely based on the delayed issuing of breach notifications to individuals impacted by a protected health information breach. In 2013, Presense St. Joseph Medical Center, a hospital run by Illinois-based Presense Healthcare, discovered that operating room schedules containing 836 individuals protected health information had gone missing from the Presense Surgery Center at St. Josephs. The documents contained a range of sensitive information on patients, including names, dates of birth, medical record numbers, treatment dates, procedures performed,...

Read More
Global Cybercrime Costs Will Top $6 Trillion in 5 Years
Jan04

Global Cybercrime Costs Will Top $6 Trillion in 5 Years

A recent report published by Cybersecurity Ventures suggests global cybercrime costs will double over the next five years. Global cybercrime costs in 2015 are estimated to have reached $3 trillion. The damage inflicted by cybercriminals has been predicted to top $6 trillion by 2021. The managed security services provider (MSSP) and advisory firm calculated the damages from theft of intellectual property and data, financial fraud, embezzlement, post-attack disruption to business processes, in addition to the cost to businesses of resolving data breaches, limiting reputational harm, conducting forensic investigations, and restoring normal business processes. A massive hike in global cybercrime costs can be expected. Even over the course of the last 12 months the potential attack surface...

Read More
New Leet Botnet Used in 650Gbps DDoS Attack
Jan02

New Leet Botnet Used in 650Gbps DDoS Attack

A new botnet has been discovered to almost rival Mirai. The Leet botnet is capable of performing DDoS attacks of at least 650 Gbps 2016 has seen an increase in DDoS attacks on organizations, not only in terms of frequency but also scale. The Mirai botnet was used to conduct massive DDoS attacks on a number of websites and online platforms towards the end of the year. KrebsOnSecurity was attacked, with the DDoS assault registering 620 Gbps, and French hosting company OVH registered a 990Tbps attack – The largest ever DDoS attack reported. That was until the massive attack on DNS provider Dyn. That attack was reportedly 1.2 Tbps. The Mirai botnet – a botnet consisting of thousands and thousands of compromised IoT devices – was used for all of the above DDoS attacks, yet was not even...

Read More
New Hampshire Hospital Data Breach Result of Human Error
Dec30

New Hampshire Hospital Data Breach Result of Human Error

A recent New Hampshire Hospital data breach has resulted in the disclosure of the protected health information of 15,000 patients. The Department of Health and Human Services (DHHS) psychiatric hospital data breach occurred in October last year. The person responsible for the breach was identified at the time, but the incident was not deemed to be severe and the attack went unreported. In October 2015, a patient of New Hampshire Hospital used a hospital library computer to access non-confidential files. A staff member noticed that the patient had accessed information that shouldn’t have been accessible and the incident was reported to a supervisor. However, the matter was not reported to hospital officials, although action was taken to restrict access to library computers. 10 months...

Read More
Final Cybersecurity Guidance on Medical Devices Issued by FDA
Dec27

Final Cybersecurity Guidance on Medical Devices Issued by FDA

Final cybersecurity guidance on medical devices has been issued by the U.S. Food and Drug Administration (FDA). The 30-page document augments previous guidance published by the FDA in 2014 and is intended to help manufacturers of medical devices implement policies, procedures, and controls to secure postmarket devices. Previous guidance has covered security controls and policies that should be implemented to ensure medical devices are secured before coming to market. The latest document covers the processes that should take place to ensure that medical devices are continuously checked to ensure vulnerabilities are addressed before they can be exploited by hackers. In recent years, a number of medical devices have been shown to contain serious vulnerabilities that could be exploited by...

Read More
Microsoft Admits Its Windows 10 Update Policy Was Too Aggressive
Dec26

Microsoft Admits Its Windows 10 Update Policy Was Too Aggressive

The aggressive tactics used by Microsoft to get push its Windows 10 upgrade annoyed many users. Many Windows users felt they were being bombarded with communications telling them to upgrade for security recommendations. The frequency that dialog boxes popped up on screens and the inability to remove or prevent notifications from appearing angered many Windows 7 and Windows 8 users. During a weekly podcast, Chris Capossela, Microsoft’s Chief Marketing Officer, apologised for the tactics that Microsoft used to promote the upgrade, although he did point out that Microsoft’s intentions were good – To ensure users of Windows were better protected against malware and other threats. Capossela said “finding that right balance where you’re not stepping over the line of being too aggressive is...

Read More
63% Increase in Healthcare Data Breaches in 2016
Dec22

63% Increase in Healthcare Data Breaches in 2016

There has been a 63% increase in major healthcare data breaches in 2016, according to the 2016 Healthcare Cyber Breach Report from cybersecurity firm TrapX. The report, which covers healthcare data breaches in 2016 from January 1 to December 12, shows that while the total number of healthcare records exposed in 2016 was considerably lower than last year, the number of incidents increased substantially. In 2015, 111,812,172 records were breached in major cyberattacks. In 2016, the number of exposed or stolen records was ‘only’ 12,057,759. However, in 2016, the healthcare industry in the United States experienced 93 major data breaches in 2016. In 2015, TrapX documented 57 major healthcare data breaches. The report shows how the number of major cybersecurity breaches has increased every...

Read More
Over 400,000 New Phishing Webpages are Created Every Day
Dec20

Over 400,000 New Phishing Webpages are Created Every Day

Cybercriminals are now creating record numbers of phishing sites and are using those sites to steal login and email credentials and credit card information. The malicious websites can be convincing. Images are taken from legitimate websites to make the webpages appear genuine. Sites perform complementary – but fake – virus and malware scans and convince visitors that their computers have been infected, and new scams are constantly being created to convince visitors to part with sensitive information or download malware. Antivirus companies and web filtering service providers are quick to identify new phishing sites. New malicious sites are rapidly added to blacklists enabling the sites to be blocked. Individuals and companies protected by solutions to neutralize web-borne threats remain...

Read More
November 2016 Breach Barometer Report: Worst Month for Health Data Breaches
Dec16

November 2016 Breach Barometer Report: Worst Month for Health Data Breaches

The November 2016 Breach Barometer Report from Protenus provides a snapshot of the state of healthcare data security, cataloging the health data breaches that occurred last month. The report is released each month and provides a useful record of HIPAA breaches throughout the year. While the total number of health records exposed or stolen in November fell from the previous month, and November figures are the seventh lowest of the year, the November 2016 Breach Barometer Report shows that November has been the worst month of the year for the number of security incidents reported. In November, 57 healthcare institutions reported a security incident that resulted in the exposure of more than 500 healthcare records, eclipsing the total for last month. August was the worst month of the year...

Read More
Samsa Ransomware Nets Criminals at Least $450,000 in a Year
Dec16

Samsa Ransomware Nets Criminals at Least $450,000 in a Year

The cybercriminals who have been infecting consumers and businesses with the ransomware variant SamSa have reportedly extorted $450,000 from businesses and consumers over the past 12 months, according to a recent report from Palo Alto Networks Unit 42 team. Researchers were able to calculate the cybercriminals’ minimum earnings by monitoring the Bitcoin Wallet addresses used by the attackers. Palo Alto Networks was able to see payments totaling 607 Bitcoin had been made to the attackers’ account. However, the actual earnings are likely to be considerably higher. Palo Alto Networks does not believe it has tracked all of the payments as ransomware gangs take steps to hide their activities and it is unlikely that all samples of the ransomware have been captured. To date, Palo Alto Networks...

Read More
70% of Businesses Infected With Ransomware Pay Up
Dec16

70% of Businesses Infected With Ransomware Pay Up

A recent study conducted on behalf of IBM Security has clearly demonstrated why ransomware has proved so popular with cybercriminals. Out of 600 businesses that were surveyed, almost half reported having experienced a ransomware attack. Out of those that had, 70% paid the attackers to supply keys to unlock the encryption. Ransom demands are typically around $700 per infected device, although the amounts charged can vary considerably. However, the ransom demands issued to business are considerably higher than those issued to consumers mostly because infections spread through networks and result in many devices being encrypted. The businesses that had paid a ransom to regain access to their data were forced to dig deep. Half of businesses paid more than $10,000 for the keys to unlock their...

Read More
December 2016 Adobe Patch Fixes Actively Exploited Vulnerability
Dec14

December 2016 Adobe Patch Fixes Actively Exploited Vulnerability

An actively exploited vulnerability in Adobe Flash has now been patched. The December 2016 Adobe patch also fixes a further 16 Flash vulnerabilities rated as critical and 8 flaws in other Adobe products. In total, the latest update addresses 31 separate vulnerabilities across nine different Adobe products. The December 2016 patch has been released for Windows, Macintosh, Linux, and the ChromeOS. Users have been advised to apply the patch as soon as possible by upgrading to Flash version 24.0.0.186, although the vulnerabilities in Google Chrome and Internet Explorer will be patched by Google and Microsoft via their own update processes. The vulnerabilities addressed in the December 2016 Adobe patch are being tracked under the following CVE codes: CVE-2016-7867, CVE-2016-7868,...

Read More
Windows XP Use Places 90% of UK Hospitals at Risk of Cyberattack
Dec13

Windows XP Use Places 90% of UK Hospitals at Risk of Cyberattack

Hospitals throughout the United Kingdom are still using the outdated, unsupported, and unpatched Windows XP release, even though by doing so they are placing their networks at risk of attack. A recent study conducted by Citrix shows that 9 out of 10 National Health Service Trusts in the United Kingdom still have Windows XP machines in use. Microsoft has released Vista, Windows 8, and Windows 10 since Windows XP, and support for the XP operating system was stopped more than two years ago, yet hospitals are still using the machines. Citrix submitted Freedom of Information requests to NHS trusts throughout the United Kingdom. 63 NHS trusts received the requests and 43 responded. While some NHS trusts have already made plans to retire Windows XP machines this year or next year, an alarming...

Read More
Windows 8 and 10 Update Knocks Users Offline?
Dec13

Windows 8 and 10 Update Knocks Users Offline?

Internet Service Providers in the UK and Belgium have been flooded with calls from disgruntled customers who have been prevented from accessing the Internet over the weekend. The problem has been attributed to a flawed update that was automatically installed by Microsoft. The problems started last week with customers of ISPs BT, Plusnet, and TalkTalk experiencing intermittent Internet access, while Sky and Virgin Media customers also experienced problems on Sunday. The connectivity problems were occurring regardless of the router and ISP, with the bug linked to a Windows 8 and Windows 10 update. Microsoft has confirmed that it is aware of the problem and is investigating; However, at this stage the cause of the problems are something of a mystery. It is unclear exactly which part of the...

Read More
December 2016 Patch Tuesday Addresses 6 Critical Vulnerabilities
Dec13

December 2016 Patch Tuesday Addresses 6 Critical Vulnerabilities

December 2016 Patch Tuesday saw Microsoft correct 34 separate flaws across 12 bulletins. Six bulletins are rated as critical, the remaining 6 are rated important. The latest round of patching rounds off a year that has been a record-breaker for Microsoft. More Windows patch bulletins have been released in 2016 than in past years. The number of patch bulletins released in 2016 is 15% higher than last year, which was also a record breaking year. The yearly total of Windows patch bulletins now stands at 155 after December 2016 Patch Tuesday. The record was broken in November when the total exceeded the previous record of 135 Windows patch bulletins. With so many patch bulletins it can be difficult for organizations to keep on top of the updates. The critical flaws addressed on December 2016...

Read More
Three New Linux Kernel Vulnerabilities Uncovered
Dec12

Three New Linux Kernel Vulnerabilities Uncovered

Three new Linux kernel vulnerabilities have been uncovered by security researchers which could potentially be exploited by hackers to cause Linux systems to crash or to enable hackers to remotely run arbitrary code. While older versions of Linux contain numerous flaws, one of the new Linux kernel vulnerabilities affects the most recent versions of Linux including Fedora, Red Hat Enterprise Linux (RHEL) 7, and Ubuntu. CVE-2016-8655, which was discovered by security researcher Philip Pettersson, is a race condition bug in packet_set_ring that could be exploited on systems where unprivileged namespaces are enabled. A race condition is a situation where the system attempts to perform two or more operations at the same time. The vulnerability could be exploited even when Supervisor Mode...

Read More
323,000 New Malware Samples Being Discovered Every Day
Dec09

323,000 New Malware Samples Being Discovered Every Day

According to the latest figures from Kaspersky Lab, there are now more than 323,000 new malware samples being released every day: An increase of 13,000 per day compared to last year and 253,000 more malicious files per day than in 2011. Kaspersky Lab’s cloud database now contains the signatures for more than 1 billion forms of malware. The massive rise in new forms of malware is due to more sophisticated means of creating new malware. Now malware developers are able to develop brand new forms of malware automatically using sophisticated production software. Ransomware too has proliferated in 2016. This month, Kaspersky Lab reports that 62 new ransomware families have appeared so far in 2016, and new modifications to those ransomware families have increased substantially throughout the...

Read More
Insider Breach Threat Main Concern of Half of IT Professionals
Dec02

Insider Breach Threat Main Concern of Half of IT Professionals

Almost half of IT professionals believe the insider breach threat is more of a concern than the threat posed by hackers. Hackers may pose a major risk to data security, but it is the insider breach threat that is most difficult to deal with. IT security solutions can be purchased to secure the network perimeter, but protecting data from internal attacks and accidental breaches is a major challenge. 49% of IT professionals that responded to a recent Dimensional Research/Preempt survey said they are most concerned about the threat from within. There are many ways that data can be exposed or stolen, but it is not deliberate sabotage or data theft by employees that is the biggest concern. 87% of respondents said it was careless employees and individuals that lacked security awareness that...

Read More
IBM Reports Increase in VOIP Cyber Attacks
Dec01

IBM Reports Increase in VOIP Cyber Attacks

A new report by IBM’s Security Intelligence team show there has been an increase in VOIP cyber attacks in 2016, with a significant increase in the second half of the year. The majority of VOIP cyber attacks in the past month (51.47%) are on VOIP systems that operate on the Session Initiation Protocol (SIP): One of the most common VOIP protocols in use. 48.39% of attacks affected Cisco’s Skinny Client Control Protocol (SCCP): The protocol used for communications between Cisco VoIP phones and the Cisco Unified Communications Manager. According to the report, “Spikes in July and September were mostly the result of specially crafted SIP messages that were terminated incorrectly. Persistent, invalid messages are known to cause vulnerable servers and equipment to fail.” The majority of attacks...

Read More
Princess Locker Ransomware Decryptor Released
Nov24

Princess Locker Ransomware Decryptor Released

A security researcher from Poland – Hasherezade – has released a Princess Locker ransomware decryptor, which has been made available for victims of the ransomware to use  free of charge. Princess Locker ransomware is currently being offered to cybercriminals on darknet marketplaces under a ransomware-as-a-service model. While not one of the most prevalent forms of ransomware, it still posed a significant threat until the release of the Hasherezade’s Princess Locker ransomware decryptor. Princess Locker ransomware has been around for some time, but since it has not been used as part of major campaigns and few security firms have been able to analyze the malicious software due to the difficulty in obtaining a sample. According to Hasherezade, the ransomware uses a similar...

Read More
$650,000 UMass HIPAA Settlement Announced by OCR
Nov23

$650,000 UMass HIPAA Settlement Announced by OCR

The University of Massachusetts Amherst (UMass) has agreed to pay the Department of Health and Human Services’ Office for Civil Rights (OCR) $650,000 to settle potential violations of the Health Insurance Portability and Accountability Act (HIPAA). The UMass HIPAA settlement could have been much higher, although OCR took into consideration the financial position of the University, which had operated at a financial loss last year. OCR launched an investigation of UMass in 2013 following a breach of protected health information caused by a malware infection. The malware was installed on a workstation used by the University of Massachusetts’ Center for Language, Speech, and Hearing on June 18, 2013. The infected computer contained a range of sensitive data including names, addresses, dates...

Read More
Antivirus Software No Longer Sufficient to Protect Against Internet Threats
Nov18

Antivirus Software No Longer Sufficient to Protect Against Internet Threats

According to Darren Bilby, a senior security researcher at Google, antivirus software is no longer good enough to protect against Internet threats. Antivirus software still has its place, but the software will not protect organizations against all malware, ransomware, and other Internet threats. The use of anti-virus products also introduces a false sense of security. People think they are protected because they use antivirus software and set it to update automatically. They also conduct regular scans to ensure nothing has slipped through the net. However, antivirus software cannot detect and protect against all malware. Access to systems can be gained without detection. The software is simply no longer effective enough. Bilby said antivirus software is worse than a canary in a coal...

Read More
Study Shows Fall in Organizational Resilience Against Cyberattacks
Nov18

Study Shows Fall in Organizational Resilience Against Cyberattacks

This week, the Ponemon Institute published the results of its 2016 Cyber Resilient Organization study which showed that organizational resilience against cyberattacks is has fallen over the last 12 months. The Ponemon Institute describes organizational resilience against cyberattacks as the ability of an organization to “maintain its core purpose and integrity in the face of cyberattacks.” The IBM’s Resilient-sponsored study showed that only 32% of IT security professionals rated their resilience against cyberattacks as high. Last year, 35% of IT security professionals rated their resilience as high. When asked about how well their organization would be able to respond to a cyberattack, 66% said they did not think their organization would be able to recover. 68% of respondents said...

Read More
What are the Highest Risk IoT Devices for Enterprises?
Nov18

What are the Highest Risk IoT Devices for Enterprises?

Internet-connected devices can introduce considerable security risks, but what are the highest risk IoT devices for enterprises? According to a new report from cloud-based information security company Zscaler, the highest risk IoT devices for enterprises are surveillance cameras – devices that are purchased and installed to decrease risk. Unfortunately, while surveillance cameras can be used to reduce the risk of theft of equipment, they can actually increase the risk of data theft. Surveillance cameras have been discovered to contain numerous security vulnerabilities that can all too easily be exploited by hackers. As we have seen in recent weeks, some models lack even basic security protections, which has allowed hackers to add them to botnets capable of delivering devastating...

Read More
October Breach Barometer Shows Hacking and Malware Main Causes of Healthcare Data Breaches
Nov18

October Breach Barometer Shows Hacking and Malware Main Causes of Healthcare Data Breaches

Protenus has released its October Breach Barometer – a snapshot of healthcare data breaches that were reported last month. The report is a useful tool for tracking data security incidents and gives some insight into the main causes of healthcare data breaches in the United States. In the first half of the year healthcare data breaches increased steadily rising to a high of 42 incidents in August. In September, healthcare data breaches fell to 37 incidents and the downward trend has continued into October. 35 breaches were reported by healthcare organizations last month. While this is certainly a step in the right direction, the month’s total is still considerably higher than the first six months of 2016, when the average number of healthcare data breaches per month was a little over 25....

Read More
Research Suggests Increased Enterprise Security Risk from IT Decentralization
Nov18

Research Suggests Increased Enterprise Security Risk from IT Decentralization

A recent VMWare sponsored study conducted by Vanson Bourne suggests enterprises face an increased security risk from IT decentralization and IT professionals are not ready to deal with the security challenges that come from moving their IT infrastructure to the cloud. Vanson Bourne conducted the study on 3,300 individuals in 20 industries from 20 countries. Respondents were asked about IT decentralization and use of the cloud computing. 69% of respondents said they believed the management of IT had become more decentralized over the past three years, yet 65% of IT professionals didn’t like it and wanted IT to be more centralized. The fact that IT departments do not welcome decentralization indicates that IT professionals are not yet ready to deal with the challenges that decentralization...

Read More