The Best Security Advice from Leading Experts

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22
Next The Best Security Advice from Leading Experts-14 Next

Health Care Data a Prime Target for Cybercriminals

Nine out of 10 health care organizations have been breached since 2013. Cybercriminals are wreaking $6 billion in annual damage on America's largest private-sector industry. Why is health care data so vulnerable? First, the health care infrastructure is an easy target because its security is often outdated. Second, medical records are increasingly available online, and connected devices and the cloud provide a broader attack area. But most importantly, health care data is financially valuable to cybercriminals.

What can be done to curb the cyber threats against the health care industry? Sue Marquette Poremba says,

"The easy answer is to upgrade the IT infrastructure to something more secure, but that's expensive and takes time. But here are some more suggestions: regular risk assessments and better employee security training. And I'll take it one step further: Industry leaders need to get on board and begin taking security a lot more seriously. Until they do, there will be no budget or support to upgrade security needs, and frankly, this is data that is too important to leave unprotected."

Read more at Health Care Data Equals Big Bucks for Cybercriminals.

Your company's data — client information, payment information, personal files, bank account details — is always at risk of falling into the wrong hands. And every day, security threats seem to come from a new place.

In this slideshow, we have collected some of the best advice that leading security experts have shared with IT Business Edge recently, identifying areas of data vulnerability and helping you develop strategies for securing your data and information systems.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.