Cyber Review
35 views | +0 today
Follow
 
Rescooped by 11 Paths from Healthcare and Technology news
onto Cyber Review
Scoop.it!

Healthcare cybersecurity info sharing still a work in progress

Healthcare cybersecurity info sharing still a work in progress | Cyber Review | Scoop.it
While President Barack Obama issued an executive order to use information sharing and analysis organizations to boost cybersecurity awareness and coordination between private entities and the government, those efforts need more development before...

Via Technical Dr. Inc.
11 Paths's insight:

This is a great news story

more...
No comment yet.
Your new post is loading...
Your new post is loading...
Rescooped by 11 Paths from SME Cyber Security
Scoop.it!

Bug in 1,000 apps could open Apple devices to hacking

Bug in 1,000 apps could open Apple devices to hacking | Cyber Review | Scoop.it
Here's how to know if the apps you use may be leaving you and your personal data vulnerable

Via Roger Smith
more...
Roger Smith's curator insight, April 23, 2015 12:53 AM

Systems built on systems built on systems is one of the inherent problems associated with software development.


Eduardo Vaz's curator insight, April 24, 2015 8:57 AM

Find out if any of your #iPhone apps are making your personal information available to hackers. #ygk

Scooped by 11 Paths
Scoop.it!

BBC Science Documentary 2015 - Future Robotics Technology New Mind Blow Full Nat geo Documentary

BBC Science Documentary 2015, Future Robotics Technology New Mind Blow Full National Geographic Documentary.
more...
No comment yet.
Rescooped by 11 Paths from OSINT News
Scoop.it!

Cyber Alert: Islamist hackers seize control of Defra's air-quality website - The Guardian

Cyber Alert: Islamist hackers seize control of Defra's air-quality website - The Guardian | Cyber Review | Scoop.it
Group calling itself Moroccan Islamic Union-Mail posts picture of Saddam Hussein and criticises Britain for its role in invasion of Iraq

Via Paulo Félix
11 Paths's insight:

Purportedly Islamist aligned hacking collective 'Moroccan Islamic Union-Mail' hacked UK Gov website (Low profile environmental site that reports air pollution levels) last week, it was administered by a 3rd party business. I'm not sure the  group are genuine Islamic fundamentalists in the style of the Syrian Electronic Army or the recent Cyber Caliphate TV5 Monde hack, seemingly more like a lizard squad type prank, but interesting for clients who administer low profile government affiliated websites (like Capita did) that they still are risk.

more...
No comment yet.
Rescooped by 11 Paths from SME Cyber Security
Scoop.it!

Thousands of WordPress sites hacked by exploiting a flaw in RevSlider plugin | Cyber Defense Magazine

Thousands of WordPress sites hacked by exploiting a flaw in RevSlider plugin | Cyber Defense Magazine | Cyber Review | Scoop.it
RT @cyberdefensemag: Thousands of WordPress sites hacked by exploiting a flaw in RevSlider plugin http://t.co/T3NrQp2kgg #CDM #CyberDefense…

Via Roger Smith
11 Paths's insight:

Great Graphs

more...
Roger Smith's curator insight, April 7, 2015 10:13 PM

Cybercriminals have been leveraging a vulnerability in a popular WordPress plugin to redirect the visitors of thousands of websites to exploit kits, a researcher has warned

Rescooped by 11 Paths from The MarTech Digest
Scoop.it!

9 big takeaways from last week's #MarTech conference - Chief Marketing Technologist

9 big takeaways from last week's #MarTech conference - Chief Marketing Technologist | Cyber Review | Scoop.it
Wow. Last week’s MarTech Conference was an awe-inspiring two and a half days for me.

Via CYDigital/marteq.io
11 Paths's insight:

awe-inspiring article

more...
CYDigital/marteq.io's curator insight, April 6, 2015 8:20 PM

I wholly agree with #4 and #6, but without a standard, I can't agree that Marketing Automation is engineering. Of course, you'll need to click through for the flavor. 

Cammie Dunaway's curator insight, April 7, 2015 3:39 PM

Excellent summary of important trends in this brave, exciting new world for marketers!

Rescooped by 11 Paths from Healthcare and Technology news
Scoop.it!

Healthcare cybersecurity info sharing still a work in progress

Healthcare cybersecurity info sharing still a work in progress | Cyber Review | Scoop.it
While President Barack Obama issued an executive order to use information sharing and analysis organizations to boost cybersecurity awareness and coordination between private entities and the government, those efforts need more development before...

Via Technical Dr. Inc.
11 Paths's insight:

This is a great news story

more...
No comment yet.
Rescooped by 11 Paths from HIPAA Compliance for Medical Practices
Scoop.it!

Dem: USIS data breach affected more than 27K

Dem: USIS data breach affected more than 27K | Cyber Review | Scoop.it
Chinese hackers broke into the government's former top background investigator last year.

Via Technical Dr. Inc.
more...
No comment yet.
Rescooped by 11 Paths from Cybersecurity
Scoop.it!

How not to get hacked, lesson 1: don't share your passwords

How not to get hacked, lesson 1: don't share your passwords | Cyber Review | Scoop.it

It’s one of a golden manners of passwords: don’t uncover them to people. But French broadcaster TV5 pennyless this order in fantastic conform only after having a radio channels and websites hacked on Wednesday night. When a cameras of France2 came to a TV5 newsroom to news on a story and talk rep... http://exploitarchive.com/how-not-to-get-hacked-lesson-1-dont-share-your-passwords/


Via thomas buth
more...
No comment yet.
Rescooped by 11 Paths from SME Cyber Security
Scoop.it!

Are you safe in the Internet of Things?

Are you safe in the Internet of Things? | Cyber Review | Scoop.it
So where are you vulnerable? A better question might be where are you NOT vulnerable?

Via Roger Smith
11 Paths's insight:

Example Personalised comment

 

more...
Roger Smith's curator insight, April 6, 2015 9:53 PM

The Internet of Things, the popular name for the technology by which devices are connected and controlled over the Internet, is big, and it is only getting bigger.

Rescooped by 11 Paths from SME Cyber Security
Scoop.it!

Sneaky 'Dyre' Malware Bilks Corporate Bank Accounts

Sneaky 'Dyre' Malware Bilks Corporate Bank Accounts | Cyber Review | Scoop.it
Malicious software that blows past antivirus software undetected, combined with sophisticated social engineering (i.e.

Via Roger Smith
more...
Roger Smith's curator insight, April 7, 2015 10:15 PM

"At some point in the first quarter, they got aggressive, they added this whole social engineering aspect to it," said John Kuhn, a senior cyber threat researcher at IBM. "They're going after North American corporate banking. They're going after the big money."

Rescooped by 11 Paths from HIPAA Compliance for Medical Practices
Scoop.it!

Data Breaches Are Serious Exposures for Fitness Businesses | Resourcebeat content from Club Industry

Data Breaches Are Serious Exposures for Fitness Businesses | Resourcebeat content from Club Industry | Cyber Review | Scoop.it

Technology is a huge advantage for the fitness industry today, but it also has brought with it serious exposures as well. A data breach can destroy a fitness business by damaging its reputation and relationship with its members, clients and employees. Small and mid-sized business owners need to be aware that they are just as vulnerable to data breaches and hacking as large businesses. The personal information of members, clients and employees can be lost, stolen or destroyed by computer hackers, thieves and even dishonest employees. Sensitive data can be improperly exposed through accidental or inadvertent release.

 

With recent publicity about large data breaches of prominent organizations, concerns about cyber liability have grown to a point in which most state legislatures have passed laws requiring business owners to notify affected persons. In most states, a business must be able to notify all parties whose personal information may have been released or exposed, communicate the scope of the potential data breach to them, and provide access to credit monitoring assistance and identity restoration to them. In addition, the business owners may face legal defense and settlement costs if claims are brought against them because of the breach.

 

The first step to addressing the exposure is to understand what a data breach is. To do so, it is necessary to define the "personal information" that would compose a data breach. Personal information that can uniquely identify an individual is called Personal Identifying Information (PII) and includes an individual's first name or first initial and last name, in combination with any one of the following data:

Social Security number;driver's license number;bank account number;credit or debit card number with personal identification number such as an access code, security codes or password that would permit access to an individual's account;home address or email address; andmedical or health information.

 

A data breach makes PII available to unauthorized individuals inside or outside of the organization.

 

All fitness businesses collect PII on members and employees, as well as many prospects and guests. Please note that Health Insurance Portability and Accountability Act (HIPAA) compliance relates to an organization's need to comply with the privacy rules set out by the Health Insurance Portability and Accountability Act. This is not usually triggered unless a business receives direct insurance reimbursement for services. All fitness facilities have liability for data breach, but only those receiving insurance reimbursement will have the requirement to meet HIPPA guidelines for privacy as well.

 

The data breaches making media headlines right now are systems-related and have to do with computer hackers gaining unauthorized access to PII data electronically. It is important to remember that physical data breaches still occur as well and include misplaced backup files, paper files being lost or misplaced or a stolen laptop. Both types of data breach can result in an expensive variety of damages for a fitness business including:

interruption of ongoing operations;destruction of hardware and software;release of sensitive business information; or the exposure of the PII of members, clients, employees, vendors or partners.

 

Beyond the legal requirements imposed by state laws and the costs associated with meeting them, how a business owner responds to a data breach can mean the difference between preserving members verses losing them. When confronted with a data breach, many business owners make short-sighted or panicked mistakes that can significantly increase their cost of responding and put their reputation at risk as well. It is imperative to develop a data breach action plan before an incident occurs that will assist the business to address the situation one step at a time if it does occur. Unfortunately, in our present technology-driven environment, it is not a matter of "if" a data breach will occur but "when" for many fitness businesses.

 

A thorough data breach action plan should start with preventive measures including training staff to properly handle PII data and maintaining appropriate protection software on all systems that store the data. Methods of containment to limit the scope of the data breach should be outlined in the data breach action plan. It will then address effective means of response, including immediate communication to those individuals affected and provide appropriate solutions for them, as well as restoring the safety of the systems going forward. The goal of the plan is to not only restore the systems so that data is once again safe, but to restore the reputation of the business by effectively addressing the well-being of the individuals affected. A well-communicated, timely and compassionate response will go a long way toward retaining the membership's confidence.

 


Via Technical Dr. Inc.
11 Paths's insight:

another great story

more...
No comment yet.