Author: Jim DeLorenzo

Categories : Data Security            Leave a comment           

As ‘digital’ extends further into the realms of the healthcare industry, thanks to the rise of mobile products and the Internet of Things (IoT), it is no longer just consumer PCs, enterprise networks and government agencies that are targets for highly sophisticated cyber-attacks – it is medical devices too. With personally identifiable information (PII) of patients being the prize, hackers are increasingly honing their skills to get their hands on this valuable data. And unfortunately, they’re getting good at it […]

Categories : Data Security            Leave a comment           

With our Healthcare Data Threat Report announced just this week, I was not surprised to see that one of our key findings aligned with the topics being discussed at the HIMSS conference. Based on my observations on the exhibit floor as well as my conversations with healthcare IT professionals and security consultants, one key theme from the report bears out: When it comes to protecting electronic personal health information (ePHI), the focus for many healthcare IT teams is still on […]

Categories : Data Security            Leave a comment           

In late October, the U.S. Department of Transportation’s National Highway Traffic Safety Administration (NHTSA) issued a set of guidelines for cybersecurity in vehicles, intended to provide direction for car makers. According to U.S. Transportation Secretary Anthony Foxx, the NHTSA’s aim is “to help protect against breaches and other security failures that can put motor vehicle safety at risk.” The proposed cybersecurity guidance for connected cars focuses on layered solutions to ensure vehicle systems are designed to take appropriate and safe […]

Categories : Data Security            Leave a comment           

Like the Internet, the Internet of Things (IoT) is going to be a part of our everyday life, with an increasing number of devices establishing connections – from smart light bulbs to connected cars and everything in between. However, as businesses and individuals alike begin to enjoy the conveniences associated with increased connectivity, these clear benefits lead to clear vulnerabilities. Increased Connectivity = Increased Risks As we’ve seen many times, attackers can often hack into connected products with shocking ease. […]