Healthcare Information Security

Cybersecurity Resources

Endpoint Protection Ransomware Effectiveness

It's estimated that in 2016, the cost of ransomware was over $1 Billion, making it the most lucrative criminal business model in the history of malware. In this report we examined who is at risk, what the scope and cost of an attack is, how... Download white paper

Securing Health IT Infrastructure to Avoid the Breach

Healthcare providers and their patients are increasingly becoming a target of cyberattacks. A recent Accenture survey found that 26 percent of consumers had their personal medical information stolen, with half of those cases leading to identity... View webcast

Forrester Total Economic Impact Study: Security Awareness Training and Simulated Phishing Platform

KnowBe4 recently commissioned Forrester to conduct a Total Economic Impact™ (TEI) study, examining the potential Return on Investment (ROI) enterprises might realize by implementing the KnowBe4 Security Awareness Training and Simulated... Download white paper

Preventing and Mitigating Ransomware Infections

Not a week goes by without hearing about a network breach of some major corporation, agency or public figure, including government officials! This webinar we will describe today's threat landscape and offer some practical, every-day protections... View webcast

Ransomware Hostage Rescue Guide Part 2 of 2

In part 2 of this webinar, we will cover the final 3 sections of the very popular KnowBe4 Ransomware Hostage Rescue Manual in depth. Including actionable items you can use like, if you should negotiate or pay the ransom, a ransomware prevention... View webcast

Ransomware Hostage Rescue Guide Part 1 of 2

2016 was a “Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight for 2017. We will... View webcast

Cisco 2017 Cybersecurity Report

Cybersecurity is a battle of innovation as attack surfaces grow, attackers nimbly evolve their approaches, and defenders are challenged to close the windows of exploit. Learn security industry insights and key findings taken from threat intelligence... Download white paper

Compliance Does Not Equal Security: 3 Emerging Security Themes in Healthcare

Ninety-six percent of industry IT security experts feel vulnerable to a data breach, and 63 percent report having suffered one. Despite these concerns, 69 percent feel that meeting compliance requirements is “very” or “extremely”... Download white paper

Ransomware Defense for Dummies

The rise of ransomware over the past few years is an ever-growing problem and there are no signs of this extremely lucrative criminal enterprise going away. Are you concerned about keeping your business up and running in the face of an attack?... Download white paper

Pegasus iOS Attack Overview

Organizations that have standardized on Apple devices might have been feeling rather smug when the HummingBad and Quadrooter vulnerabilities broke headlines, as Apple devices were unaffected. However, the grins have quickly turned to grimaces... Download white paper

Overview of HummingBad

HummingBad is the latest high profile malware designed for mobile devices. In this particular malware the attack is targeted at Android devices. Check Point, the IT security company that first detected the malware, estimates that it has infiltrated... Download white paper

Data Breach Incident Response Workbook

The consequences of data breaches are higher than ever, and are no longer limited to the privacy department – accountability has moved to C-level executives and board members. Greater consequences mean that businesses need to be prepared... Download white paper

Infographic: Ransomware: Defending the healthcare perimeter

Get the facts on ransomware attacks targeting the healthcare industry — how they work, your first line of defense against them, and how to protect PII and PHI. Download white paper

Ransomware: What every healthcare organization needs to know

Get the essentials on ransomware attacks facing the healthcare industry — including how they work, why they’re so malicious, and the best way to protect your organization. Download white paper

Prepare and Respond to Healthcare Ransomware Attacks

Healthcare ransomware has become an increasingly common type of cybersecurity attack as medical records have grown in value on the black market. Ransomware is not a new threat, but the number of attacks increased in 2015 and has led the federal... View webcast

Reduce The Number of Ransomware Infections Across Your Organization

Ransomware attacks are more successful than ever and are using some of the most sophisticated, complex, and resilient techniques and infrastructure in order to target your employees and your data. Read this guide to learn how to reduce the number... Download white paper

Are Ransomware Attacks Holding Your Industry Hostage?

Healthcare has become criminals most lucrative target. Why? Because medical records are worth 10 times that of credit cards. The recent digitization of the healthcare industry has rapidly expanded the attack surface to include electronic healthcare... View webcast

Healthcare Security: The Simplest Way to Stay Ahead of Attacks

The healthcare IT landscape is rapidly changing as organizations strive to improve healthcare outcomes while reducing costs. But the security team cannot stay ahead of the attack surface that has quickly expanded due to numerous disruptive technologies.... Download white paper

How Healthcare Benefits From Cloud-delivered Security

Healthcare IT professionals are swimming upstream to overcome security challenges. Cloud-delivered solutions may represent a life preserver in their efforts to reduce risk, simplify management and control costs. In this paper, we take a look... Download white paper

Security in Healthcare: Bolstering Connectivity and Protecting Patients

As connected services become more commonplace in healthcare, more opportunities exist for bad actors to exploit weaknesses in the industry’s security defenses. There is certainly evidence that attackers have focused their attention on healthcare.... Download white paper