Tens of Thousands of Patient Files Leaked in US Hospital Attacks

Tens of Thousands of Patient Files Leaked in US Hospital Attacks

Patients and employees from 11 hospitals in the US have had their personal information exposed after hackers reportedly published tens of thousands of records online. The files come from Leon Medical Centers, which runs eight facilities in Florida, and Nocona General Hospital, which has three in Texas. The compromised information includes patients’ names, addresses and birthdays, medical diagnoses and letters to insurers. Also exposed was a folder containing background checks on hospital staff, according to…

Read More

New AWS service addresses best practice secrets management

New AWS service addresses best practice secrets management

Data breaches are becoming increasingly common, and one factor driving this escalation is the fact that today’s IT systems are integrated and interconnected, requiring login information from multiple parties and services. In response, Amazon Web Services has newly launched the AWS Secrets Manager, a service designed to help organizations get a handle on these “secrets” by storing and accessing them in a secure way. A modern IT system may require any combination of different types of…

Read More

7 key questions facing the future of work

7 key questions facing the future of work

NorthMarq CIO Dan Ritch looks back on the tumult of 2020 with a healthy perspective on his IT team’s accomplishments during COVID-19’s workplace upheaval, and with reverence for what lies ahead. On the bright side, “It gave me more perspective on what we must do to meet our customer demands and it allowed us to accelerate our investments in technology,” Ritch says. But the year ahead poses more questions than answers. “This has set us up for…

Read More

Crypto Fund Founder Pleads Guilty to $100m Fraud Scheme

Crypto Fund Founder Pleads Guilty to 0m Fraud Scheme

The founder of two cryptocurrency hedge funds has pleaded guilty to securities fraud after apparently defrauding investors out of almost $100m. Australian national Stefan He Qin, 24, launched Virgil Sigma and VQR in New York in 2017 and February 2020 respectively. The former purported to earn money from an algorithm which took advantage of market price differences between digital currencies, while the latter employed a number of trading strategies. Together, the funds are said to…

Read More

esxsi.com – Disaster Recovery Strategy – The Backup Bible Review

esxsi.com – Disaster Recovery Strategy – The Backup Bible Review

The following post reviews The Backup Bible, a 204 page ebook written by Eric Siron and published by Altaro Software. I’ve decided to break this down into a short discussion around each section, 3 in total, to help with the flow of the text. The Backup Bible can be downloaded for free here. Initial thoughts on downloading the ebook and flicking through; clearly a lot of research and work has gone into this based on…

Read More

How a successful phishing attack can hurt your organization

How a successful phishing attack can hurt your organization

Data loss is the number one result of a fruitful phishing campaign, but account compromises and ransomware attacks can threaten your organization as well, says Proofpoint. Image: iStock/OrnRin Phishing attacks seem like a relatively simple tactic on the part of cybercriminals. Set up a phishing webpage, create your phishing email, send the email to targeted recipients, and then wait for those stolen account credentials and other compromised information to come your way. On the receiving…

Read More

Hospitality security adjusts to COVID-19 constraints

Hospitality security adjusts to COVID-19 constraints

Hospitality security adjusts to COVID-19 constraints | 2021-02-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The Difference Between White Hat, Black Hat, and Grey Hat Hackers

The Difference Between White Hat, Black Hat, and Grey Hat Hackers

Picture this: a young person is in a dark room. The only thing visible is their figure, as it is just barely lit by the blinding LEDs of their computer screen. They type furiously on an ergonomic keyboard as thousands of lines of neon green monospace text fly across the screen. Click-clack-click-clack-click-clack. The moving text and the flying fingers come to a halt, and the computer emits a positive sounding “ding!” Out from underneath a…

Read More

Proofpoint’s State of the Phish Report Reveals Ransomware and Phishing Attack Trends; Underscores Need for Tailored Security Awareness Training, Particularly for Remote Workers | Proofpoint US

Proofpoint’s State of the Phish Report Reveals Ransomware and Phishing Attack Trends; Underscores Need for Tailored Security Awareness Training, Particularly for Remote Workers | Proofpoint US

90% of U.S. infosec survey respondents said their workforce shifted to working from home in 2020, yet only 29% trained users on safe remote working habits Proofpoint, Inc. (NASDAQ: PFPT), a leading cybersecurity and compliance company, today released its seventh annual State of the Phish report, which explores enterprise phishing experiences and provides an in-depth look at user awareness, vulnerability, and resilience. More than 75% of surveyed infosec professionals said their organizations faced broad-based phishing attacks—both…

Read More

How a successful phishing attack can hurt your organization

How a successful phishing attack can hurt your organization

Data loss is the number one result of a fruitful phishing campaign, but account compromises and ransomware attacks can threaten your organization as well, says Proofpoint. Image: iStock/OrnRin Phishing attacks seem like a relatively simple tactic on the part of cybercriminals. Set up a phishing webpage, create your phishing email, send the email to targeted recipients, and then wait for those stolen account credentials and other compromised information to come your way. On the receiving…

Read More
1 2,413 2,414 2,415 2,416 2,417 2,550