The opinions expressed in this blog article are those of the author alone. In our previous blog, we discussed how pagers used in medical settings present an opportunity for threat actors to intercept valuable protected health information (PHI) and disrupt encryption and privacy. For malicious hackers, radio-based communications are a potential attack vector that organizations should… Read More
Healthcare Security Alert: Why Do Doctors Still Use Pagers?
It’s a late Saturday morning and Joe Hacker (aka WF4EAK in underground hacking circles) fires up the software-defined radio(SDR) he bought online for $20 to listen in on the local hospital paging traffic. After all, he is trying to make a few extra bucks to buy a new Xbox, and selling healthcare information on the black… Read More
What to Expect at the 2017 RSA Conference
The RSA Conference is expected to draw more than 45,000 attendees this year, making it the world’s largest security event. Both expo floors at the 2017 RSA conference (which begins Sunday, February 12 and continues through February 17 in San Francisco at the Moscone Center) are sold out, indicating that this year’s trade show should pack in… Read More
Take the Cyber Security Survey 2017 [And Get the Free Report]
Delta Risk has partnered with the Information Security Community on LinkedIn to examine the latest cyber security trends, investment priorities, challenges, and solutions regarding security-centric topics such as cloud security, mobile security, threat management, application security, managed security, and more. Let your voice be heard, and take the cyber security survey today! Everyone who completes this comprehensive survey will receive a… Read More
New Delta Risk White Paper Examines State of Healthcare Cyber Security Compliance
In the latest Delta Risk white paper, which follows our Cyber Security Primer for Healthcare white paper, we take a deeper look at the specific legal obligations that healthcare providers must meet, and how you can build a healthcare cyber security program to meet and exceed compliance responsibilities. Under the Health Insurance Portability Act (HIPAA) and the… Read More
[White Paper] Cyber Threat Hunting: How to Find Attackers Others Missed
As 2016 draws to a close, we predict that the term hunt will continue to be a talking point throughout the cyber security community in 2017. As we pointed out in a previous blog, Threat Hunting: More Than a Marketing Buzzword, cyber threat hunting involves any concentrated effort to discover attackers inside your network that everyone else may have missed… Read More