Remove recover-health-care-data-breach
article thumbnail

What you need to know about the Marriott breach

The Parallax

The year was 2014, and from then until November 2018, hackers have been stealing data from computers controlled by Starwood Hotels and Resorts ( now owned by Marriott Hotels). READ MORE ON DATA BREACHES. How to tell you’re part of the 30 million user Facebook breach. Facebook was breached. Chuck Schumer (D-N.Y.)

Hotels 190
article thumbnail

To prevent EHR breaches, stop using them (Q&A)

The Parallax

The idea behind electronic health records seems sound: Bring a patient’s paper chart into the Digital Age. Brase, whose book on the subject, Big Brother in the Exam Room , was published in July, describes the problem as having brought together seemingly disparate health care threads. It’s little more than a myth. Twila Brase.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Daily Crunch: Identity-as-a-service platform Okta says it ‘contained’ network breach in January

TechCrunch

Okta leaks, stock dips : Okta, a former startup and present-day public company, confirmed a January breach today “after hackers posted screenshots overnight apparently showing access to the company’s internal systems,” TechCrunch reports. Up first, a robot that scans crop fields for health indicators and potential issues.

Network 225
article thumbnail

How hackers are approaching medical cybersecurity

The Parallax

Triaging modern medicine’s cybersecurity issues How to recover from a health care data breach To prevent EHR breaches, stop using them (Q&A) Ransomware attacks against hospitals: A timeline How weak IoT gadgets can sicken a hospital’s network Opinion: Who foots the bill for medical IoT security?

IoT 189
article thumbnail

What Should A CIO Do After You’ve Been Hacked?

The Accidental Successful CIO

We’re All Under Attack CIOs have to realize that the immediate aftermath of a breach is the critical time for your hacked organization. What we need to understand is what to do, and not do, after a breach. Most IT departments measure things like system uptime, patch and vulnerability data, and pen test results, etc.

article thumbnail

Poor security, not just password reuse, to blame for Disney+ breach

The Parallax

But after a widespread breach of the entertainment company’s new Disney+ accounts , at least one cybersecurity research company is indicating that its new streaming service needs more than a magical concoction to fly among those it’d qualify as reasonably secure. READ MORE ON DATA BREACHES. Want to stop data breaches?

article thumbnail

Why health care cybersecurity is in ‘critical condition’

The Parallax

SAN FRANCISCO—Between the destructive cyberattacks WannaCry and NotPetya , which wreaked havoc across health care and beyond, the U.S. government-sponsored Health Care Industry Cybersecurity Task Force delivered more than 100 recommendations to the Department of Homeland Security to make medical technology more resistant to hackers.

IoT 187