The healthcare industry is in the midst of tremendous change. And it comes from the pressure to modernize aging systems, the continued shift to cloud computing, as well as the rapid adoption of telemedicine and electronic medical records. And all during a time of an ongoing pandemic and the continuous targeting of healthcare systems by cybercriminal.
All about Virtualization and Cloud Security | Recent Articles:
When it comes to managing the security of their data and business-technology systems, many healthcare enterprises focus heavily on regulatory compliance efforts, such as their HIPAA security and patient privacy mandates. This is for an excellent reason — noncompliance can lead to costly fines and the ire of regulators. While it’s likely that focusing on regulatory compliance can incrementally improve security, that shift alone won’t take the organization to the level of security maturity it needs to have to protect against today’s threats such as ransomwar.
Healthcare providers are operating in a time of extraordinary pressure. Whether it's recovering their operations from a devastating pandemic year or it's the pace that their organization is embracing a rapid digital transformation aimed to optimize and modernize their systems. The last thing healthcare organizations needed this past year was an increase in ransomware and other types of attacks — but that's precisely what they experienced.
As new threats hit enterprise systems and light up enterprise security dashboards, security analysts need to make swift and accurate decisions so that they can respond in the best way possible. Yet, so many alerts come at any given time that the ability for the typical security team to focus on the alerts that matter can seem impossible.
It’s often asked, why can’t security innovate more?
It seems that every week new news breaks regarding the progress toward reaching practical quantum computing. While this is excellent news for the promised benefits quantum computing will provide, it helps society tackle the biggest problems in computing that traditional computers just can't handle. These include potential breakthroughs in artificial intelligence, the complex modeling involved in nuclear fusion, improved solar cells, cancer, and disease treatments, and financial markets modeling.
- S. Secretary of Homeland Security details Federal Cybersecurity Strategy.
- Initial focus on ransomware, workforce, industrial control security.
- The federal government needs to take a risk-based, long-term view on cybersecurity.
- Executive order under consideration would expand what companies have to disclose security breaches to the federal government.
- Such breach disclosure laws have been long found over legal concerns.
- The EO would also establish that certain software vendors maintain a software bill of materials.
- 53% of Web traffic is now cloud-related, a 20% year over year increase.
- 61% of all malware is directly delivered via the cloud.
- Malicious Office documents represented 17% of all malware detected.
- Analysts expect the global IoT market to grow from about $212 billion in 2018 to about 1.3 trillion by 2026
- Unfortunately, these devices often ship with security flaws, poor API management, and lack efficient ways to provide security updates
- Special Publication 800-213 helps federal agencies understand how IoT devices can impact the network and information security risks within their organizations
- 83% of employers now say the shift to remote work has been successful for their company, compared to 73% in a prior survey.
- Less than one in five executives say they want to return to the office as it was pre-pandemic.
- Enterprises are going to have to balance convenience and security over the long haul.
- As enterprises get comfortable with remote work, their priorities are going to shift.
- Cybersecurity will be forefront in the year ahead between concerns about cyber espionage and ongoing nation-state attacks, and federal cybersecurity organizational efforts.
- Remote work has accelerated enterprises are turning zero trust architectures to improve their security.