data breaches
See the following -
Obamacare Enrollment Company Fumbles Client Data
In a slipup to stoke Republicans' Obamacare security concerns, Enroll Alaska accidentally released email addresses of about 300 clients Monday afternoon. Read More »
- Login to post comments
Plurilock Security and Cycura to Co-Host Healthcare Cybersecurity Webinar
Plurilock Security Inc...an innovative cybersecurity company that provides frictionless and continuous authentication using machine learning and behavioral biometrics and Cycura, a subsidiary of WELL Health Technologies Corp. and a leading provider of proactive cybersecurity services, today announced that they will be co-hosting a virtual panel discussion, titled 'Patient Data in the Crosshairs: Healthcare Breaches of 2020' on Thursday, November 12th at 2:00 pm (EST).
- Login to post comments
Prepare to Be Hacked: Information Security for Small Organizations
Information security is challenging, and can be breathtakingly expensive in money and staff energy. Smaller organizations may not have the money or staffing expertise to do the job right, even when the need is the greatest. At OSCON 2016, Kelsey Gilmore-Innis of Sexual Health Innovations (SHI) gave a really interesting talk on how her small nonprofit has done some creative thinking about security, and how that influences the deployment and operation of their application. Callisto is an online reporting system designed to provide a more empowering, transparent, and confidential reporting system for college sexual assault survivors...
- Login to post comments
Q&A: The Philosophical Shift True Security Requires
...[Cris] Ewell spoke with Executive Editor Tom Sullivan about AOB, what he considers the three types of adversaries to guard against, and the need for balancing both risk and federal regulations...
- Login to post comments
The Medicare Machine: Patient Details of 'Any Australian' for Sale on Darknet
A darknet trader is illegally selling the Medicare patient details of any Australian on request by “exploiting a vulnerability” in a government system, raising concerns that a health agency may be seriously compromised. An investigation by Guardian Australia can reveal that a darknet vendor on a popular auction site for illegal products claims to have access to any Australian’s Medicare card details and can supply them on request...
- Login to post comments
Why Healthcare Data Security, Compliance Issues Go Untreated
Secure managed file transfer solutions can be beneficial to covered entities as they work to overcome healthcare data security and compliance issues. If there ever was a pulse of healthcare operations, it’s data. From patient enrollment forms, electronic health records, and health insurance information, the amount of electronic data flowing through the medical community increases every day. With that, healthcare data security must also be a top priority...
- Login to post comments
Healthcare Cybersecurity Webinar Hosted by Plurilock and Cycura
Plurilock Security Inc. and Cycura, a subsidiary of WELL Health Technologies Corp. will be co-hosting a virtual panel discussion, titled 'Patient Data in the Crosshairs: Healthcare Breaches of 2020' on Thursday, November 12th at 2:00 pm (EST). Ian L. Paterson, CEO of Plurilock will be joined by Iain Paterson, CEO of Cycura, David Dowe, Director of Cybersecurity at ICES, John Daniele, VP Threat Intelligence at Scope Security, and Arjun Kumar, CIO at WELL Health to speak on the vulnerability of the healthcare sector and the necessary cybersecurity measures that need to be taken by healthcare companies to protect valuable information.
- Login to post comments
ATARC Panel: Preventing Data Breaches from the Edge to the Cloud
Join us for this panel, which sets out to discuss how advancements in the federal cloud space, mobility and distributed workforces have driven the focal point for security to shift. Topic experts will discuss lessons learned in successfully implementing cloud methodologies, tools, and techniques in a time of continuous change and telework. Together, panelists explore available and desired solutions to rectify past and pre-empt potential future data breaches, as both citizens and the government agencies serving them embrace “the new normal”.
- Login to post comments