SUBSCRIBE TO TMCnet
TMCnet - World's Largest Communications and Technology Community

CHANNEL BY TOPICS


QUICK LINKS




Cyber Security Trend Week in Review: Healthcare Hackers, Ransomware, Database Security Strategies

Cyber Security Featured Article

Cyber Security Trend Week in Review: Healthcare Hackers, Ransomware, Database Security Strategies

Share
Tweet
July 09, 2016
By Alicia Young
Web Editor

Cyber security is something we all need and can benefit from. Whether you are safeguarding your personal laptop or work computer, having those security measures is absolutely necessary to making sure your private files stay private. Cyber Security Trends has all the information you need on the latest systems and how to protect yourself. With that—it’s time for the Week in Review!


The week started off with some insight into the recent healthcare attacks by the hacker called “thedarkoverlord.” Special guest author Michael Magrath discusses the hacker’s bold moves and how he even goes so far as to describe how he hacked into the U.S. healthcare systems. The hacker gained access to 655,000 patient records through three attacks. This is clearly a problem for confidentiality, among other issues, so It’s Time to Better Protect Patient Data.

On the same note, special guest writer Adam Laub discusses ransomware and cyber threats in his new article. Here, he explores what differentiates ransomware from other kinds of cyber attacks, and why it is so dangerous. After discussing ransomware at length, he then goes on to talk about what steps should be taken to safeguard against these attacks. A few listed precautions include: educating users, data strategies, penetration testing and more. You can find out all the information you need to know HERE.

Special guest David Maman opens up his new article with an important question: Do you have a database security strategy? If not, he states, then your business is at risk. He stresses the importance of having effective database security by pointing out that “the database holds some of the most valuable data being targeted and is ultimately the final destination of any attack.” So, how do you go about protecting your system? Find out about good database security strategies HERE.

That’s all for this week. Be sure to go to Cyber Security Trend’s website to read some of the other articles posted this week, and don’t forget to check back next week for the latest news. Have a great weekend!



Article comments powered by Disqus
Cyber Security Homepage »





Technology Marketing Corporation

2 Trap Falls Road Suite 106, Shelton, CT 06484 USA
Ph: +1-203-852-6800, 800-243-6002

General comments: [email protected].
Comments about this site: [email protected].

STAY CURRENT YOUR WAY

© 2024 Technology Marketing Corporation. All rights reserved | Privacy Policy