ProCircular Information Security Experts Corner

WannaCry: Solutions to the Latest Ransomware Challenge

Posted by Aaron R. Warner on May 15, 2017 7:56:20 AM

 

The WannaCry (aka wCry or WannaCrypt) ransomware is making its way across the world, and there are several variants on their way to the united states. The original version of the ransomware behaves much like the Locky or other mainstay threats – it encrypts your data with military-grade encryption tech, starts a timer, and provides you with a place that you can pay to get a key which allows you to decrypt your valuable data.
Read More

Topics: Data Breach, Cybersecurity, Incident Rsponse, Incident Response, healthcare, it risk assessment

Diagnosing the Cybersecurity Bug

Posted by Solomon Smith on Apr 24, 2017 3:06:59 PM

Industry Trends

Cybersecurity in the healthcare field has gone through a lot changes the past few years. In 2016 there was a significant jump in the total number of healthcare specific cybercrimes.  According to SecurityIntelligence there was a 71% increase of confirmed data breaches in the healthcare sector from 2015 to 2016.  Drilling down on that increase revealed that most of the jump was from external (aka "hacking" or ransomware or malware") followed by internal non-malicious (aka accidents from insiders).  Trends are showing that cybercriminals have found more value in healthcare data and the potential for long term use is much higher because it is more difficult to change an individual’s "health data".  Another eye-opener is that the type of healthcare entities affected is not limited to hospitals.  Business associates, specialized care providers and healthcare plan have all been targets for cyber crime.  Oncology, anesthesiology, orthopedic, and radiology are a few of the specific entities that were in the top 10 largest healthcare breaches of 2016.  This data tells us that cybercriminals will target or find data outside of the large medical providers and may even be targeting the organizations that have lagged behind in implementing security controls.  

Read More

Topics: Cybersecurity, healthcare, HIPAA, Data Security, Information Security, Network Security