Tuesday, April 17, 2018

Customers describe the impact of the Allscripts ransomware attack

Ransomware, healthcare and incident response: Lessons from the Allscripts attack

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Apr 17, 2018
Featured Image

Customers describe the impact of the Allscripts ransomware attack

A ransomware attack against a SaaS provider hurts customers, but when it's a healthcare company that's hit, patients suffer. Such was the case with January's attack against Allscripts, one of the largest electronic health record and practice management technology vendors. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Ransomware, healthcare and incident response: Lessons from the Allscripts attack
Get a 299-Piece All-Purpose First Aid Kit For $12 Today
The dirty dozen: 12 top cloud security threats for 2018
Beware these 4 types of IRS scams
Is source code inspection a security risk? Maybe not, experts say
5 top machine learning use cases for security

eGuide: Citrix Systems Inc

Business Agility via Cloud

Yes - cloud has gone mainstream. It's just too hard to ignore all its benefits: agility; closer collaboration between IT departments and business units; faster feedback loops; easier design of products and services. Cloud allows you to investigate machine learning, chatbots, the Internet of Things, and other disruptive technologies. Read More

Thumbnail Image

Ransomware, healthcare and incident response: Lessons from the Allscripts attack

The actors behind SamSam launched a devastating attack against Allscripts in January, 2018. As Allscripts worked its incident response plan, things started to unravel. Here are the lessons learned. Read More

Thumbnail Image
DealPost

Get a 299-Piece All-Purpose First Aid Kit For $12 Today

The highly rated kit includes a first aid guide, vinyl gloves, bandages, cold compress, gauze pads, trauma pad, cotton-tipped applicators, first aid tape roll, antiseptics and all three common OTC pain medications. Neatly organized in a soft zippered pouch. Read More

Thumbnail Image

The dirty dozen: 12 top cloud security threats for 2018

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services. Read More

Thumbnail Image

Beware these 4 types of IRS scams

From fake IRS phone calls to W-2 phishing. Here's what you need to know about the different types of IRS scams and how to protect yourself. Read More

Thumbnail Image
INSIDER

Is source code inspection a security risk? Maybe not, experts say

Some information security insiders raised a red flag when Russian requests to review security software code became known. The controversy may be a tempest in a teapot. Read More

Thumbnail Image
INSIDER

5 top machine learning use cases for security

Machine learning will make sense of the security threats your organization faces and help your staff focus on more valuable, strategic tasks. It could also be the answer to the next WannaCry. Read More

White Paper: Tempered Networks

Identity-Based Software-Defined Networking Brings Control and Simplicity

The concept of Identity-Defined Networking, which enables the creation of instant overlay networks that are inherently secure and mobile - with no changes to the existing underlay network - appeals to 98% of survey respondents. Read More

CSO Insider

1. 14 top tools to assess, implement, and maintain GDPR compliance
2. What are the GDPR requirements?
3. Third-party security vetting: Do it before you sign a contract
4. Separation of duties and IT security
5. Review: Bricata adds threat hunting to traditional IPS/IDS

Editor's Picks

1. Rogues' gallery: 7 insiders who breached security
2. Why you don't need an RFID-blocking wallet
3. The 6 best password managers
4. 8 hot cyber security trends (and 4 going cold)
5. The 10 Windows group policy settings you need to get right
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:03 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive