Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Medical Data

Below you will find reports with the tag of “Medical Data”

image from Prevent Healthcare Data Breaches With Indentity Management

Prevent Healthcare Data Breaches With Indentity Management

Learn how Single Sign-On and identity management can be used for the healthcare industry. In 2016 alone, over 15 million medical records were stolen due to data breaches. The risks associated with security and identity management are higher in healthcare than any other industry.

(more available)
Added: October 21, 2018
image from Hacking Healthcare IT in 2016

Hacking Healthcare IT in 2016

This report begins with the following statement, “Among all of America’s critical infrastructures, the healthcare sector is the most targeted and plagued by perpetual persistent attacks from numerous unknown malicious hackers, intent on exploiting vulnerabilities in their insecure and antiquated networks in order to exfiltrate patient health records.” The paper then goes on to discuss the IT struggles of the healthcare sector.

(more available)
Added: October 18, 2018
image from 2016 Data Breach Industry Forecast

2016 Data Breach Industry Forecast

To help organizations prepare for what lies ahead and ensure incident response plans are ready for the evolving data breach environment, Experian Data Breach Resolution has outlined five predictions for what we can expect in 2016.

(more available)
Added: October 16, 2018
image from Balancing Security and Accessibility with Compliance in the Healthcare Sector

Balancing Security and Accessibility with Compliance in the Healthcare Sector

This white paper presents some interesting information related to the cybersecurity issues that can occur in the healthcare sector.

Added: October 16, 2018
image from Cybercrime And Other Threats Faced By The Healthcare Industry

Cybercrime And Other Threats Faced By The Healthcare Industry

In this paper they discuss several aspects of the healthcare threat surface.

Added: October 16, 2018
image from 2015 Data Breach Industry Forecast

2015 Data Breach Industry Forecast

To help businesses understand implications of such changes and navigate the road ahead, Experian Data Breach Resolution has developed six key predictions about how the data breach industry will evolve in 2015. These predictions are based on experience helping more than 3,000 companies manage breaches of all types in 2014 and conversations with leaders across the security landscape. With this mindset, they also looked back at how our 2014 predictions played out.

(more available)
Added: October 15, 2018
image from HTTPS/SSL White Paper

HTTPS/SSL White Paper

For many organizations, dealing with HTTPS traffic is something of a double edge sword. Recent moves to encryption challenge the status quo in terms of organizational oversight. Finding a balance between competing interests will be critical to moving forward, but while present technology limitations hamper those efforts, technological advancements can enhance them.

(more available)
Added: October 15, 2018
image from Are Wireless Medical Devices "Hospital Grade?"

Are Wireless Medical Devices "Hospital Grade?"

This paper will take a quick look at two real-world examples of product releases gone wrong and overview the risks & challenges inherent in optimizing performance of wireless medical devices. They then outline best practices for cost-effectively mitigating risk and euring quality in life-critical deployment scenarios.

(more available)
Added: October 14, 2018
image from BREACH REPORT 2015: Protected Health Information

BREACH REPORT 2015: Protected Health Information

This is Redspin’s 6th annual Breach Report: Protected Health Information (PHI). At the conclusion of each year, they analyze the complete statistical data set of large breaches that have been reported to HHS. In the report, they assess the overall effectiveness of the current policies and controls designed to safeguard PHI. In 2105, they identify significant trends and draw attention to the specific areas most in need of improvement. They then offer Redspin’s recommendations for preventive measures and corrective actions to address any critical gaps or weaknesses. Their goal is to help the healthcare industry continually improve its ability to protect patient information.

(more available)
Added: October 14, 2018
image from Healthcare Cyber Research Report For 2017 A CryptoniteNXT Special Report

Healthcare Cyber Research Report For 2017 A CryptoniteNXT Special Report

This Health Care Cyber Research Report for 2017 shares very recent research on cyberattacker activity in 2017 and the virtual explosion in the reported use of ransomware in attacking health care institutions. 2017 has been a very challenging year for health care institutions. They remain under sustained attack by cyberattackers that continue to target their networks through the use of well understood vulnerabilities.

(more available)
Added: October 14, 2018
image from Quarterly Threats Report March 2018 Infographic

Quarterly Threats Report March 2018 Infographic

This infographic is a summary of the main points in the McAfee Labs Quarterly Threat Report from March 2018

Added: October 14, 2018
image from What's Hindering Interoperability Across Healthcare Networks

What's Hindering Interoperability Across Healthcare Networks

Interoperability between healthcare networks is a major goal and a major challenge for many healthcare providers. Combining today’s advanced cyberthreats and the challenges of HIPAA compliance makes sharing PHI a daunting task for many healthcare groups. Read this paper to learn how interoperability and HIPAA compliance are achievable.

(more available)
Added: October 14, 2018
image from 2015 Data Breach Reports

2015 Data Breach Reports

This report is an overwhelmingly large list and description of security breaches. It details type of industry impacted, type of attack, and types of information compromised.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 08:08 UTC (build b1d7be4)