mobile device security
See the following -
Cyber Threats To Healthcare Systems, Medical Devices Rising
Compared to other industries, healthcare is particularly vulnerable to cyber attacks with the threats to health information continuing to mount as the industry moves to adopt electronic health records. Earlier this month, the FBI's Cyber Division issued a notice warning that healthcare systems and medical devices are at risk for increased cyber intrusions for financial gain.
- Login to post comments
Mobile Devices, Apps Open For Attacks
In many ways, mobile device security is an oxymoron in its current state. In fact, if you're using an Internet of Things-type device, chances are it has an average of 25 hidden vulnerabilities, according to new research, making it a ripe target for hackers...
- Login to post comments
The Goldilocks Problem of Mobile Security - Usability vs. Security
The “Goldilocks and the Three Bears” story begins with a girl tasting porridge. The first bowl is too hot, the second is too cold, and the third is “just right.” This article considers mobile device security for government and organizations. The theme is trade-offs between the usability of a mobile device and security for confidential organizational data such as conversations, messages, documents, images, and locations. The security, confidentiality, and integrity of communication are key. However, if the usability of mobile devices for end-users, administrators, and organizations is too challenging, then the availability of the data for productive work is lost.
- Login to post comments
Want To Protect Your EHR From Hackers? Secure Those Mobile Devices
Hackers used malware to penetrate Community Health Systems' firewall, and once inside, they made off with some 4.5 million medical records — a staggering but not surprising number to cyber security professionals. While the uninformed may ask how such a thing could happen, the probable cause is user error...
- Login to post comments
ATARC Panel: Preventing Data Breaches from the Edge to the Cloud
Join us for this panel, which sets out to discuss how advancements in the federal cloud space, mobility and distributed workforces have driven the focal point for security to shift. Topic experts will discuss lessons learned in successfully implementing cloud methodologies, tools, and techniques in a time of continuous change and telework. Together, panelists explore available and desired solutions to rectify past and pre-empt potential future data breaches, as both citizens and the government agencies serving them embrace “the new normal”.
- Login to post comments