Healthcare is abuzz with talk of artificial intelligence. And when it comes to cybersecurity, that buzz both has to do with how the bad guys are going to use it, and how the good guys can apply it to defense. But Ryan Witt, VP, Industry Solutions, Healthcare, Proofpoint, warns that today, the time of small- […]
In the constantly evolving world of cyberattacks, the new holy grail is gaining access to credentials – which bad actors are accomplishing by identifying and targeting the most vulnerable parties, said our panelists in a recent discussion. “Everybody wants credentials.”
As CIOs face mounting pressures to deliver innovative solutions while ensuring data are secure, the best course of action is to form strategic partnerships with vendors, said Tressa Springmann and Julie Bonello during a recent panel discussion.
It’s no longer just one-time malicious links CISOs have to worry about; threat actors are chipping away at firewalls by “befriending targets” and obtaining “pieces of information that seem innocuous,” said Ryan Witt of Proofpoint during a recent panel discussion.
With phishing attacks becoming increasingly sophisticated, the smart approach is to focus not on prevention, but on identifying the most likely targets, putting controls in place, and offering continuous education, according to our cybersecurity experts.
The easiest route for cybercriminals in accessing patient data is through email, according to CISOs Chris Frenz and Steve Dunkle, who share tips on how to do that, and how to stay ahead of the next wave of threats.
For health IT leaders, 2020 proved to be the ultimate litmus test. What matters, however, isn’t whether organizations passed, but how they reacted, and how they plan to improve going forward, said our panelists.
As cyberattacks become increasingly complex – and are tailored to target specific individuals – the methods used to prevent them must become more sophisticated, according to our security experts, who discussed the issue during a recent webinar.