Cloud Security

Public Cloud Adoption Rises, But Health Security Concerns Remain

by Jill McKeon

Organizations that host all their applications in the public cloud are less likely to experience a data breach or ransomware attack, according to a new report conducted by market research firm Vanson...

CSA Offers Guidance on Preventing Ransomware in the Healthcare Cloud

by Jill McKeon

The Cloud Security Alliance’s (CSA) Health Information Management Working Group recently released guidance warning healthcare delivery organizations about the growing threat of ransomware in the...

DoD: Staff Need Healthcare Privacy, Cloud Security Certifications

by Jill McKeon

The US Department of Defense (DoD) will now require certain incoming cybersecurity staff to complete two additional (ISC)² certifications focused on healthcare privacy and cloud security. The...

Patient Data from Multiple Providers Leaked in Third-Party GitHub Incident

by Jessica Davis

The patient data from multiple providers appears to have been captured and subsequently leaked on the data repository GitHub Arctic Code Vault by third-party vendor MedData, according to a new...

Top Health IT Security Challenges? Medical Devices, Cloud Security

by Jessica Davis

Cloud security and connected medical device security are the biggest IT challenges healthcare entities are facing under the current landscape, according to 46 percent of IT leaders surveyed...

CISA: Poor Cyber Hygiene Exploited to Compromise Cloud Security Services

by Jessica Davis

Threat actors are successfully exploiting organizations with poor cyber hygiene to compromise cloud security services, according to a new Department of Homeland Security Cybersecurity and...

350M Voicemails, Health Details Exposed by Misconfigured Database

by Jessica Davis

Comparitech researchers discovered a trove of Broadvoice databases containing more than 350 million customer records, including names, contact details, and in some...

Medical Software Database Exposes Personal Data of 3.1M Patients

by Jessica Davis

A medical software company’s database containing the personal information of more than 3.1 million patients was left exposed online without the need for a password or other authorization,...

Cloud Mitigation for Ransomware, as COVID-19 Spurs Cyberattacks

by Jessica Davis

A host of cyberattack trends on the health sector emerged in the wake of the COVID-19 pandemic, as hackers sought to take advantage of the crisis with ransomware and misinformation campaigns, according...

Report: Unsecured, Misconfigured Databases Breached in Just 8 Hours

by Jessica Davis

New research from Comparitech shows hackers begin targeting online databases just hours after the initial setup process, finding inadvertently unsecured or misconfigured databases can be...

Remote Attacks on Cloud Service Targets Rose 630% Amid COVID-19

by Jessica Davis

A recent McAfee report confirms that cybercriminals have been steadily working to exploit the increase in remote work during the COVID-19 pandemic, with researchers finding that remote attacks on cloud...

DHS Shares Cloud, Microsoft Office 365 Insights for COVID-19 Telework

by Jessica Davis

The Department of Homeland Security Cybersecurity and Infrastructure Security Agency released COVID-19 telework guidance for Microsoft Office 365 and other cloud services, given many organizations have...

Enterprise Public Cloud Adoption Stifled by Privacy, Security Concerns

by Jessica Davis

The majority of IT leadership say privacy and security concerns are restricting the adoption of public cloud services within their organization, despite finding significant value in its adoption,...

NSA Shares Guide for Mitigating Cloud Vulnerabilities, Threats

by Jessica Davis

The National Security Agency released new guidance designed to help organizations across all sectors mitigate cloud vulnerabilities, including identifying cloud security components, threat actors, and...

Increased EHR Adoption Raises Need for Robust Security

by Elizabeth Snell

EHR security is one small piece to the larger data security puzzle that healthcare organizations, especially those of a larger size, are becoming increasingly aware of and looking to address. Under HIPAA, covered entities have the...