INFOSECURITY NEWSLETTER

July 26, 2017

Massive Healthcare Fraud Takedown Sees 412 Charged for $1.3 Billion in Fraudulent Billings

HIPAA Journal Staff, hipaajournal.com, July 19, 2017

Last week, the United States Department of Justice announced the largest healthcare fraud action to date. 412 individuals were charged, including 115 doctors, nurses and other medical professionals for their roles in healthcare fraud schemes. 120 doctors and other medical professionals were charged for prescribing opioids and other dangerous narcotics.

Read More

What We Learned From the 2017 National Insider Threat Symposium and Expo

Devesh Panchwagh, deltarisk.com, July 21, 2017

The 2017 National Insider Threat Symposium and Expo, hosted by the National Insider Threat Special Interest Group (NITSIG), put the spotlight on insider threat detection, behavior patterns, program development, law enforcement, legal ramifications, and future challenges.

Read More

Cybersecurity Spending: Are You Patching Holes or Checking Boxes?

Brad Fuller, cio.com, July 20, 2017

We often hear clients and prospective clients asking “how much should I be spending on cybersecurity?” That is a very complex question and one that is not easily answered without first having an understanding of what you mean by cybersecurity.

Read More

Children Especially Vulnerable to Cybersecurity Attacks in Health Care

AAP Division of Quality, aappublications.org, July 20, 2017

As electronic options to provide and access patient health information increase, so too can opportunities for hackers to steal that information or hold it hostage if medical professionals do not maintain and upgrade their cybersecurity.

Read More

Is That Really You Typing? New DoD Tech Will Know

Mohana Ravindranth, nextgov.com, July 19, 2017

The Pentagon could soon do away with authentication cards if a new approach takes off: using a person’s typing behavior to verify their identity. Within three to five seconds—12 to 25 keystrokes—a new product called Biotracker can collect enough data about a computer user to distinguish them from others in their organization.

Read More

Resolving the Cyber Security Crisis of Confidence

Nick Ismail, information-age.com, July 20, 2017

As the number of high-profile data breaches continues to rise year-on-year, cybersecurity has never been as prominent in the public eye, with WannaCry being the most obvious recent example.

Read More

Who’s Responsible for Protecting Patient Data in the Cloud?

Bill Siwicki, healthcareitnews.com, July 18, 2017

When it comes to hiring, enterprise security teams can use all of the help that they can rally. When hiring entry-level talent, that’s not as easy as it may seem — many times because entry-level applicants don’t do everything they could to help their cause.

Read More

Over 70,000 Memcached Servers Still Vulnerable to Remote Hacking

Swati Khandelwal, thehackernews.com, July 18, 2017

Nothing in this world is fully secure, from our borders to cyberspace. I know vulnerabilities are bad, but the worst part comes in when people just don’t care to apply patches on time. Late last year, Cisco’s Talos intelligence and research group discovered three critical remote code execution (RCE) vulnerabilities in Memcached.

Read More

How to Avoid Being the Weakest Link in Your Company’s Information Security

John White, inc.com, July 10, 2017

When you think of hackers, you probably think of some spy movie where they come down from the ceiling to steal a computer off of a desk and then whisk it away to their laboratory where they input lines of code to crack the encryption. In reality, hacking is often as simple as learning about a user and then guessing their password or even asking them for it: a process called social engineering.

Read More
financial newsletterhealthcare newsletter
Infosecurity Newsletter Archive

June 2018: 6th

May 2018: 2nd, 9th, 30th

April 2018: 4th, 11th, 18th, 25th

March 2018: 7th, 14th, 21st, 28st

February 2018: 7th, 14th, 21st, 28th

January 2018: 3rd, 10th, 17th, 24th, 31st

December 2017: 6th, 13th, 20th

November 2017: 1st, 15th, 29th

October 2017: 4th, 11th, 18th, 25th

September 2017: 6th, 13th, 20th, 27th

August 2017: 2nd, 9th, 16th, 23rd, 30th

July 2017: 5th, 12th, 19th, 26th

June 2017: 7th, 14th, 21st, 28th

May 2017: 3rd, 10th, 17th, 24th, 31st

April 2017: 5th, 12th, 19th, 26th

March 2017: 1st, 8th, 15th, 22nd, 29th

February 2017: 1st, 8th, 13th, 22nd

January 2017: 4th, 11th, 18th, 24th

December 2016: 7th, 14th, 21st, 28th


top cyber incident pain points