Security

Subscribe Archives >
 

Breaches of Health Care Data: A Growing Epidemic

1 day ago | by Samuel Greengard

Few types of data are as sensitive and valuable as protected health information (PHI). Unfortunately, theft of this information is becoming a regular event. According to the "Verizon 2015 Protected... Read More

 
 
 
 
 
 

LATEST STORIES

  • Cyber-Attacks Increase Significantly
     
    The rapid growth of cyber-crime and the resulting risks are frightening to both businesses and consumers. It's increasingly difficult to evade the problem. A new report from security firm ThreatMetrix, "Cybercrime Report 2015," illustrates just how...
     
    READ MORE
     
  • Is Nothing Sacred?
     
    An assortment of apps are stealing data, tracking the location of users, sending unauthorized messages to contacts, and even making unauthorized phone calls.
     
    READ MORE
     
  • Is Your LinkedIn Profile at Risk?
     
    The social media service is a target for cyber-crime, and cyber-threat groups have created an extensive network of fake but convincingly real LinkedIn profiles.
     
    READ MORE
     
  • Where Is Today's Cyber-Security Leadership?
     
    We need to rethink convenience. In the rush for fast and easy, we've created a massive and expensive security problem that threatens the integrity of business.
     
    READ MORE
     
  • Is Our Trust in Mobile Apps a Mistake?
     
    Over the last decade, mobile technology has radically redefined our business and personal lives. Smartphones and tablets are ubiquitous, and mobile apps are everywhere. However, a recent survey by mobile security and analytics firm Bluebox found...
     
    READ MORE
     
  • New York City Credit Union Banks on Encryption
     
    To offer secure customer communications, the Melrose Credit Union deployed encryption services that include file transfers and integrate with existing workflows.
     
    READ MORE
     
  • Security Fears Delay Mobility Initiatives
     
    As mobility continues to sweep through the business world, users are taking whatever steps they have to—with or without management permission—to access the data and applications they need to do their job. This demand for anytime/anywhere...
     
    READ MORE
     
  • Enterprises Must Prepare for Nation State Attacks
     
    Today's cyber-security environment is rapidly going from bad to worse. Not only must organizations combat a steady stream of hacks and attacks from the outside while coping with insiders who intentionally or inadvertently put systems and data at...
     
    READ MORE
     
  • Manufacturing Danger
     
    Any electronic device connected to a network is potentially at risk, so security must be part of any design, engineering or manufacturing process from the start.
     
    READ MORE
     
  • Employees Ignore Risks of Online Holiday Shopping
     
    Regardless of the potential consequences, a great many employees shop for the holidays on both company computers and their personal mobile devices while on the job, according to a recent survey from CareerBuilder. A significant number of them will...
     
    READ MORE
     
 
 
 
 
 

Security Archives >

 
 
Manage your Newsletters: Login   Register My Newsletters