By Paul Nadrag – By now, all hospitals and health systems are aware of ransomware-related cyberattacks where a hacker will gain control of a computer network, data center or cloud server and encrypt the data, effectively blocking access until a ransom is paid.Read More
By Art Gross – At times, it feels as if we could start every week with this sentence: “There’s a new tactic being used by cybercriminals to trick unsuspecting victims.” And the sophistication level of the new tactics is off the charts. So, what are we dealing with as of late? Well, where should we start…
By Art Gross – Whether it involves faces masks, hand sanitizer, hospital and medical supplies, or a stimulus check, scams against healthcare organizations and individuals are booming with COVID-19 as the starting point.
By Art Gross – Every day in my newsfeed I’m alerted to yet another compromise to patient information. The headline isn’t always the attention-grabbing ones that we see when major credit companies or big-box retailers are exposed.
By Art Gross – Dr. William Scalf told a local news outlet, WWMT West Michigan, that hackers locked the files at Brookside ENT and Hearing Center, demanding $6,500 for the decryption key to regain access to their files.
By Art Gross – As the digital ecosystem continues to thrive and advance, so too must the regulations and practices for safely caring for sensitive data. That is especially true for the healthcare industry, which continues to be a prime target for cybercriminals.
By Art Gross – Remember ransomware, the malicious software that blocks computer access until a ransom demand is paid? The threat was huge and dominated headlines in the past but seems to have slowed down in recent months.
By Brian Stone – Healthcare IT security pros face the important and difficult task of keeping patients’ sensitive data secure. This type of data is a prime target for cybercriminals, since health records contain more personal data points than, say, credit card data and cannot just be reissued if a breach occurs.
By Art Gross – Business email compromise (BEC) scams remain one of the most widely used attack vectors among cybercriminals to date. In fact, cybercriminals are finding so much success in exploiting human vulnerabilities through BEC scams that their frequencies have been dramatically increasing.