Healthcare

Dark Devices Undermine HIPAA Compliance and How to Regain Visibility
Kevin Golas
Dark Devices Undermine HIPAA Compliance and How to Regain Visibility

Data breaches in healthcare continue to be a growing issue. Healthcare organizations, often large and distributed, are encumbered by legacy systems, inadequate security budgets and an increasing threat landscape that complicates an already complex system. Faced with these challenges, it is increasingly important that healthcare organizations make the most of existing security investments and that new investments can prove their worth. Forrester’s Chris Sherman recently talked about the pitfalls of adding more depth to the security...

READ MORE
10 Ways to Rethink Healthcare Security
Kevin Golas
10 Ways to Rethink Healthcare Security

October is National Cyber Security Awareness Month, a global campaign run annually to raise awareness about the importance of cybersecurity. We’ve asked some of our leading security experts here at Absolute to chime in on some of the most pressing issues in cybersecurity today. In Part 3 of this series, we bring you insight from Kevin Golas, Senior Director, Investigations and Risk Management who brings extensive insight into the...

READ MORE
Are Hacked Medical IoT Devices Ransomware’s Next Target?
Richard Henderson
Are Hacked Medical IoT Devices Ransomware’s Next Target?

Shortly after IoT became a mainstream topic, the idea of device access-control falling into the wrong hands also grabbed headlines. Was it possible? What would happen? These are particularly concerning questions for healthcare organizations who deal in life-saving devices. But the notion of hacked medical devices such as defibrillators, pacemakers and insulin machines seemed more science fiction than real risk – a few years ago. Today, we know hacked...

READ MORE
Healthcare: Top Target for Data Theft
Absolute
Healthcare: Top Target for Data Theft

One in four U.S. consumers (26 percent) have had their healthcare data breached from technology systems, according to an Accenture survey. Unfortunately, it’s no longer a question if a breach will occur, but when…

READ MORE