article thumbnail

IoT Adoption in Healthcare Brings Security Opportunities

CIO

In August 2022, the French hospital Centre Hospitalier Sud Francilien (CHSF) was the victim of a ransomware attack that disabled medical imaging and patient admission systems. 3 Unit 42 research also found that 83% of ultrasound, MRI, and CT scanners run on an end-of-life operating system. But ransomware isn’t the only risk.

IoT 252
article thumbnail

ChatGPT and Your Organisation: How to Monitor Usage and Be More Aware of Security Risks

CIO

In one example , a doctor uploaded their patient’s name and medical condition in order to generate a prior authorisation letter to the patient’s insurance company. JPMorgan Chase has limited employees’ usage of ChatGPT due to compliance concerns. Businesses are racing to implement policies to limit ChatGPT usage. Phishing 2.0:

ChatGPT 246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: Log4j Anniversary, CI/CD Risks, Infostealers, Email Attacks, OT Security

Tenable

Get the latest on the anniversary of the Log4j crisis; OWASP’s top CI/CD risks; a surge of infostealer malware; the fund transfer fraud — business email compromise connection; and more! . Insecure System Configuration. 3 - Attackers boost use of infostealer malware. 1 - One year after Log4j crisis, what have we learned?

article thumbnail

How to Protect Your Small Business from a Hacker Attack

The Crazy Programmer

Data breaches and compromised websites frequently used to spread malware can be risky for your business; including small businesses. Small businesses often lack sufficient technology as well as defence systems, so it would take less effort and know-how for a cyber-criminal to breach their systems. Look into Cyber Insurance.

article thumbnail

Patch Management Policy Features, Benefits and Best Practices

Kaseya

Patch management involves identifying, sourcing, testing, deploying and installing patches for all systems and applications in an organization. Patches are applied to improve the efficiency and functionality of a system as well as to mitigate security vulnerabilities. What is a patch management policy? Asset tracking and inventory.

Policies 109
article thumbnail

Push Security launches to make SaaS sprawl and shadow IT safer

TechCrunch

The initial setup involves connecting Push Security to Office 365 or Google Workspace, which imports the company’s employee profiles and reviews their security status. How it works. “This is our starting point because then the platform knows who it needs to initiate conversations with,” Bateman said.

article thumbnail

Cybersecurity Snapshot: IoT Vendors Fail at Vulnerability Disclosures, While Cyber Threats Again Top Business Risks 

Tenable

Then scan the latest list of top malware. It’s the first time the same risk has topped this annual report from insurer Allianz Global Corporate & Specialty in consecutive years. For more information, check out the coverage from NextGov , Business Insurance , Infosecurity Magazine and The Register. And much more!

IoT 52