article thumbnail

Protecting Medical Data Against a Cyber-Attack Pandemic

Thales Cloud Protection & Licensing

Protecting Medical Data Against a Cyber-Attack Pandemic. Cyber criminals are always eager to take advantage of emergencies to further launch their nefarious actions. Besides dealing with the public health pandemic, healthcare providers must deal with another pandemic: cyber-attacks. An expanding attack surface.

article thumbnail

Protecting Medical Data Against a Cyber-Attack Pandemic

Thales Cloud Protection & Licensing

Protecting Medical Data Against a Cyber-Attack Pandemic. Cyber criminals are always eager to take advantage of emergencies to further launch their nefarious actions. Besides dealing with the public health pandemic, healthcare providers must deal with another pandemic: cyber-attacks. An expanding attack surface.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Oldsmar’s Cyber Attack Raises the Alarm for the Water Industry

Cisco Security

While security controls such as automated pH testing would have prevented the poisoned water from being distributed, this story highlights how much critical infrastructures, such as water utilities, have become vulnerable to cyber attacks. What happened?

article thumbnail

Top 5 Industries Most Vulnerable to Data Breaches in 2023

Security Boulevard

Unfortunately, the increasing reliance on digital systems and capabilities has also attracted an ever-growing number of malicious actors seeking to defraud businesses through phishing , social engineering , or ransomware attacks. The end result of these types of cyber attacks are often highly public and damaging data breaches.

article thumbnail

Lessons Learned from Data Breaches at Universities

NopSec

In the case of higher educational institutions there is data exposure risk from personally identifiable information, such as social security numbers. At the University of Maryland, cyber-attacker targeted a university website meant for uploading photos. Scan high-risk web applications for OWASP Top 10 vulnerabilities.

article thumbnail

Protect 5G to Secure Sustainable Growth

Thales Cloud Protection & Licensing

The deployment of 5G to change sustainability and efficiency improvements may be jeopardized by cyber-attacks. Due to the inherent weaknesses of software, the ecosystem of 5G applications could offer a significant security risk, not only to people but to every nation. More About This Author >.

article thumbnail

10 Lessons Learned from the Top Cyber Threats of 2021

Security Boulevard

We published a whitepaper about Tactics, Techniques, and Procedures (TTPs) and also tools utilized by the DarkSide threat actors. . Practice risk management for the worst case event. Practicing risk management for assets is important to estimate and understand possible outcomes in the event of a cyber attack. .