Network Security

IBM Taps AWS to Enhance Security of Hybrid Cloud Environments

December 17, 2020 - IBM Security recently announced new technology initiatives leveraging Amazon Web Services (AWS) to help clients simplify and extend their security visibility across AWS and hybrid cloud environments.  The initiatives include integrations with AWS security services, quick start deployment for key IBM Security technologies, and consulting and...


More Articles

Working From Home Exposes New Billing Data Security Threats

by Samantha McGrail

Organizations are facing significant data security risks as stay-at-home orders increase and the first major remote billing cycle is carried out remotely, according to the Association of IT Asset...

Hospitals Prepping Health IT Infrastructure for COVID-19 Outbreak

by Samantha McGrail

Information-technology leaders are racing to get ahead of health IT infrastructure challenges and provide employees with remote work tools as they anticipate shortages due to the COVID-19 outbreak,...

Challenges of Artificial Intelligence Adoption in Healthcare

by Samantha McGrail

Artificial Intelligence (AI) adoption is gradually becoming more prominent in health systems, but 75 percent of healthcare insiders are concerned that AI could threaten the security and privacy of...

VNA and PACS Market Growth Increases Data Storage and Security

by Samantha McGrail

North America is leading the regional segment for the Vendor Neutral Archive (VNA) and Picture Archiving and Communication System (PACS) market with a share of 28.51 percent in 2018, which increases...

ECS Tapped to Modernize Health IT Infrastructure for Military

by Samantha McGrail

The Naval Information Warfare Center (NIWC) Defense Health Information Technology Division recently awarded a four-year $116 million contract to ECS to lead health IT infrastructure modernization...

Senator Sends Letter to TridentUSA on PACS Server Security Lapses

by Fred Donovan

Senator Mark Warner (D-VA) sent a letter Sept. 23 to TridentUSA seeking information about the storage of medical images on unsecured picture archiving and communication system (PACS) servers by its...

Hacker Could Gain Control of Change Healthcare Cardiology Devices

by Fred Donovan

A hacker with low skill level could gain control of connected cardiology devices made by Change Healthcare, warned an ICS-CERT advisory. “Insecure file permissions in the default installation...

Healthcare IT Network Harbors Most Prominent Vulnerabilities

by Fred Donovan

The healthcare IT network harbors the most prominent vulnerabilities in healthcare organizations, judged 232 healthcare security decision makers surveyed by Vanson Bourne on behalf of security firm...

Reports of Healthcare IT Infrastructure Vulnerabilities Surge 341%

by Fred Donovan

Reports of vulnerabilities in healthcare IT infrastructure increased 341 percent between 2017 and 2018, according to a recent study by Bugcrowd. The study, the State of Healthcare Cybersecurity 2019,...

ACN Is on Healthcare Blockchain Journey to Ease Admin Burdens

by Fred Donovan

Arizona Care Network (ACN) decided to deploy healthcare blockchain technology to alleviate administrative burdens associated with processing transactions in a secure manner, explained Jami Berger,...

Browser Flaws Exposed Local Area Networks at Health, Drug Firms

by Fred Donovan

Vulnerabilities in Chrome and Firefox browser extensions enabled attackers to access local area networks (LANs) of several healthcare and pharmaceutical companies, according to a report by security...

Health Insurance Industry Struggles to Update Legacy IT Infrastructure

by Fred Donovan

Health insurance legacy IT infrastructure was designed for transactions centered around claims, not for a consumer-engaged environment, observed Beth O’Rorke, chief information officer and...

Healthcare Internet of Things Can Expose Networks, Data to Attacks

by Fred Donovan

The proliferation of healthcare internet of things (IoT) has exposed a vulnerable attack surface that can be exploited by cybercriminals determined to steal PHI and disrupt healthcare delivery, warned...

Network, Cloud Monitoring Is Healthcare Cybersecurity Challenge

by Fred Donovan

Monitoring of networks, endpoints, and cloud assets is a continuing cybersecurity challenge for many healthcare organizations, according to CynergisTek’s 2019 annual report. This is bad news...

Healthcare’s Strong Network Security May Reflect Outdated Model

by Fred Donovan

The healthcare industry ranks fifth for network security when compared to other major U.S industries, according to 2019 Healthcare Cybersecurity Report by SecurityScorecard. This was the strongest...

HHS Comes Up Short in Web Application, Network Security, says OIG

by Fred Donovan

Eight HHS operating divisions were tested for web application and network security and found wanting, according to a recently released OIG report. The HHS divisions came up short in configuration...

HL7 Standards Could Open Health IT Infrastructure to Cyberattacks

by Fred Donovan

The HL7 standards, key for healthcare interoperability, could open up healthcare infrastructure to cyberattacks, warned researchers at the University of California (UC) system. The HL7 standards...

How Network Segregation, Segmentation Can Stop Ransomware Attacks

by Fred Donovan

Ransomware attacks against healthcare organizations have been on the rise in recent years, with sometimes devastating results.* From EHR downtime to compromised patient data, these cyberattacks can significantly disrupt the operations of...

Network Segregation Is Best Way to Thwart Ransomware Attacks

by Fred Donovan

Network segregation is the most important step a healthcare organization can take to thwart ransomware attacks, commented Kaspersky Lab Senior Security Researcher Brian Bartholomew. “Anything...