July 26, 2017
HIPAA Journal Staff, hipaajournal.com, July 19, 2017
Last week, the United States Department of Justice announced the largest healthcare fraud action to date. 412 individuals were charged, including 115 doctors, nurses and other medical professionals for their roles in healthcare fraud schemes. 120 doctors and other medical professionals were charged for prescribing opioids and other dangerous narcotics.
Devesh Panchwagh, deltarisk.com, July 21, 2017
The 2017 National Insider Threat Symposium and Expo, hosted by the National Insider Threat Special Interest Group (NITSIG), put the spotlight on insider threat detection, behavior patterns, program development, law enforcement, legal ramifications, and future challenges.
Brad Fuller, cio.com, July 20, 2017
We often hear clients and prospective clients asking “how much should I be spending on cybersecurity?” That is a very complex question and one that is not easily answered without first having an understanding of what you mean by cybersecurity.
AAP Division of Quality, aappublications.org, July 20, 2017
As electronic options to provide and access patient health information increase, so too can opportunities for hackers to steal that information or hold it hostage if medical professionals do not maintain and upgrade their cybersecurity.
Mohana Ravindranth, nextgov.com, July 19, 2017
The Pentagon could soon do away with authentication cards if a new approach takes off: using a person’s typing behavior to verify their identity. Within three to five seconds—12 to 25 keystrokes—a new product called Biotracker can collect enough data about a computer user to distinguish them from others in their organization.
Nick Ismail, information-age.com, July 20, 2017
As the number of high-profile data breaches continues to rise year-on-year, cybersecurity has never been as prominent in the public eye, with WannaCry being the most obvious recent example.
Bill Siwicki, healthcareitnews.com, July 18, 2017
When it comes to hiring, enterprise security teams can use all of the help that they can rally. When hiring entry-level talent, that’s not as easy as it may seem — many times because entry-level applicants don’t do everything they could to help their cause.
Swati Khandelwal, thehackernews.com, July 18, 2017
Nothing in this world is fully secure, from our borders to cyberspace. I know vulnerabilities are bad, but the worst part comes in when people just don’t care to apply patches on time. Late last year, Cisco’s Talos intelligence and research group discovered three critical remote code execution (RCE) vulnerabilities in Memcached.
John White, inc.com, July 10, 2017
When you think of hackers, you probably think of some spy movie where they come down from the ceiling to steal a computer off of a desk and then whisk it away to their laboratory where they input lines of code to crack the encryption. In reality, hacking is often as simple as learning about a user and then guessing their password or even asking them for it: a process called social engineering.