Because healthcare organizations are juggling so many information security, privacy and regulatory demands, hiring individuals with key professional certifications who can help optimize limited resources is critical, says security expert Steven Penn.
In addition to providing training, healthcare organizations should consider implementing technology to help prevent user mistakes that can lead to breaches of protected health information, says Geoffrey Bibby of ZixCorp.
Numerous websites, mail servers and other services - including virtual private networks as well as "all modern browsers" - have a 20-year-old flaw that could be exploited by an attacker, computer scientists warn.
Federal authorities have arrested a Chinese professor, accusing him of pilfering trade secrets from the computer systems of American high-tech companies where he and a co-conspirator once worked.
When security succeeds, it is often unnoticed. That success might also make security investments hard to sustain, given its low profile in organizations. Gartner's Tom Scholtz discusses articulating security's business value.
Breaches like the Target breach of 2013 and the recent "Heartbleed" bug may give you the impression that breaches are just an electronic problem but they aren't. It's impossible for you to personally protect your data everywhere. Comprehensive identity theft protection from LifeLock helps safeguard your finances,...
Thanks to the huge proliferation of mobile devices, millions now take their online shopping, banking, socializing and their jobs on the go. But this always-connected lifestyle has come at a steep price, as a new breed of sophisticated criminals has learned how to exploit those users' mobility to harvest personal data...
An army of 40,000 small office/home office routers have been exploited by automated malware. But who's responsible for devices being vulnerable: vendors for using well-known defaults; or distributors and IT managers for not locking them down?
The pharmaceutical industry is data-rich, and CISOs of the sector face a huge challenge in protecting its intellectual property. GlaxoSmithkline's Steve Williamson offers tips for securing the data lifecycle.
Caffeine junkies are up in arms over reports that criminals have been targeting their Starbucks account balances. But the real story is poor password-picking practices by consumers, and Starbucks' lack of multi-factor authentication.
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than...
The public demands accountability for data breaches involving government systems and expects that all government entities have the same levels of security that Fortune 500 companies do. However, most government organizations have fewer IT security resources than their larger enterprise counterparts, yet they face the...
The public demands accountability for data breaches involving private healthcare information and expects that all healthcare institutions will have the same levels of security that Fortune 500 companies do. However, most healthcare organizations have fewer IT security resources than their enterprise counterparts, yet...
Patching is among the primary challenges facing enterprises in their adoption of IoT devices. Fortinet's Darren Turnbull shares insight on how to anticipate and respond to the top security obstacles.
Fraudsters have been hacking into and draining Starbucks accounts, customers report. Security experts say attackers appear to be guessing weak account passwords, then using funds to fill up gift cards destined for the black market.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.